Vulnerabilites related to adobe - shockwave_player
CVE-2012-4173 (GCVE-0-2012-4173)
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-cve20124173-bo(79545)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79545" }, { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86538", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86538" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-cve20124173-bo(79545)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79545" }, { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86538", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86538" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4173", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-cve20124173-bo(79545)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79545" }, { "name": "VU#872545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86538", "refsource": "OSVDB", "url": "http://osvdb.org/86538" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4173", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5275 (GCVE-0-2007-5275)
Vulnerability from cvelistv5
Published
2007-10-08 23:00
Modified
2024-08-07 15:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:24:42.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SA:2007:069", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" }, { "name": "29865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29865" }, { "name": "28157", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28157" }, { "name": "30507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30507" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://crypto.stanford.edu/dns/dns-rebinding.pdf" }, { "name": "28570", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28570" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "name": "ADV-2008-1724", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1724/references" }, { "name": "TA07-355A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html" }, { "name": "oval:org.mitre.oval:def:9250", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250" }, { "name": "GLSA-200801-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml" }, { "name": "RHSA-2008:0221", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "name": "TA08-150A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "30430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30430" }, { "name": "APPLE-SA-2008-05-28", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "SUSE-SA:2008:022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "name": "28161", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28161" }, { "name": "RHSA-2007:1126", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html" }, { "name": "29763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29763" }, { "name": "238305", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "name": "26930", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26930" }, { "name": "ADV-2007-4258", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4258" }, { "name": "1019116", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019116" }, { "name": "GLSA-200804-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "name": "ADV-2008-1697", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "TA08-100A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "name": "28213", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28213" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser\u0027s DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SA:2007:069", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" }, { "name": "29865", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29865" }, { "name": "28157", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28157" }, { "name": "30507", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30507" }, { "tags": [ "x_refsource_MISC" ], "url": "http://crypto.stanford.edu/dns/dns-rebinding.pdf" }, { "name": "28570", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28570" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "name": "ADV-2008-1724", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1724/references" }, { "name": "TA07-355A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html" }, { "name": "oval:org.mitre.oval:def:9250", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250" }, { "name": "GLSA-200801-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml" }, { "name": "RHSA-2008:0221", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "name": "TA08-150A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "30430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30430" }, { "name": "APPLE-SA-2008-05-28", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "SUSE-SA:2008:022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "name": "28161", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28161" }, { "name": "RHSA-2007:1126", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html" }, { "name": "29763", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29763" }, { "name": "238305", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "name": "26930", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26930" }, { "name": "ADV-2007-4258", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4258" }, { "name": "1019116", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019116" }, { "name": "GLSA-200804-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "name": "ADV-2008-1697", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "TA08-100A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "name": "28213", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28213" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5275", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser\u0027s DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SA:2007:069", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" }, { "name": "29865", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29865" }, { "name": "28157", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28157" }, { "name": "30507", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30507" }, { "name": "http://crypto.stanford.edu/dns/dns-rebinding.pdf", "refsource": "MISC", "url": "http://crypto.stanford.edu/dns/dns-rebinding.pdf" }, { "name": "28570", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28570" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb08-11.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "name": "ADV-2008-1724", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1724/references" }, { "name": "TA07-355A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html" }, { "name": "oval:org.mitre.oval:def:9250", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250" }, { "name": "GLSA-200801-07", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml" }, { "name": "RHSA-2008:0221", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "name": "TA08-150A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "30430", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30430" }, { "name": "APPLE-SA-2008-05-28", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "SUSE-SA:2008:022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "name": "28161", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28161" }, { "name": "RHSA-2007:1126", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html" }, { "name": "29763", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29763" }, { "name": "238305", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "name": "26930", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26930" }, { "name": "ADV-2007-4258", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4258" }, { "name": "1019116", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019116" }, { "name": "GLSA-200804-21", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "name": "ADV-2008-1697", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "TA08-100A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "name": "28213", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28213" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb07-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5275", "datePublished": "2007-10-08T23:00:00", "dateReserved": "2007-10-08T00:00:00", "dateUpdated": "2024-08-07T15:24:42.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3244 (GCVE-0-2009-3244)
Vulnerability from cvelistv5
Published
2009-09-18 10:00
Modified
2024-08-07 06:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:22:24.010Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36905" }, { "name": "9682", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/9682" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "oval:org.mitre.oval:def:6530", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36905" }, { "name": "9682", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/9682" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "oval:org.mitre.oval:def:6530", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3244", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36905" }, { "name": "9682", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/9682" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-16.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "oval:org.mitre.oval:def:6530", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530" }, { "name": "1023123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023123" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3244", "datePublished": "2009-09-18T10:00:00", "dateReserved": "2009-09-18T00:00:00", "dateUpdated": "2024-08-07T06:22:24.010Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0758 (GCVE-0-2012-0758)
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-09-16 20:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:13.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0758", "datePublished": "2012-02-15T01:00:00Z", "dateReserved": "2012-01-18T00:00:00Z", "dateUpdated": "2024-09-16T20:36:56.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4307 (GCVE-0-2010-4307)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46339", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46339" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46339", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46339" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46339", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46339" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4307", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-22T00:00:00", "dateUpdated": "2024-08-07T03:43:14.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2446 (GCVE-0-2011-2446)
Vulnerability from cvelistv5
Published
2011-11-08 22:00
Modified
2024-08-06 23:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2446", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-27.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026288" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2446", "datePublished": "2011-11-08T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4195 (GCVE-0-2010-4195)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46336", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46336" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46336", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46336" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#189929", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46336", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46336" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4195", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4088 (GCVE-0-2010-4088)
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with "duplicated references to the same KEY* chunk," a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:36.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12169", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4088", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with \"duplicated references to the same KEY* chunk,\" a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12169", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4088", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with \"duplicated references to the same KEY* chunk,\" a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12169", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4088", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4088", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:36.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2043 (GCVE-0-2012-2043)
Vulnerability from cvelistv5
Published
2012-08-15 10:00
Modified
2024-09-17 01:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-15T10:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2043", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2043", "datePublished": "2012-08-15T10:00:00Z", "dateReserved": "2012-04-02T00:00:00Z", "dateUpdated": "2024-09-17T01:06:03.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0757 (GCVE-0-2012-0757)
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-09-16 20:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0757", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0757", "datePublished": "2012-02-15T01:00:00Z", "dateReserved": "2012-01-18T00:00:00Z", "dateUpdated": "2024-09-16T20:12:26.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-6270 (GCVE-0-2012-6270)
Vulnerability from cvelistv5
Published
2012-12-20 11:00
Modified
2024-08-06 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of a Shockwave Player 10.4.0.025 compatibility feature via a crafted HTML document that references Shockwave content with a certain compatibility parameter, related to a "downgrading" attack.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#546769", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/546769" }, { "name": "VU#323161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/323161" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of a Shockwave Player 10.4.0.025 compatibility feature via a crafted HTML document that references Shockwave content with a certain compatibility parameter, related to a \"downgrading\" attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T19:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#546769", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/546769" }, { "name": "VU#323161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/323161" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-6270", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of a Shockwave Player 10.4.0.025 compatibility feature via a crafted HTML document that references Shockwave content with a certain compatibility parameter, related to a \"downgrading\" attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#546769", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/546769" }, { "name": "VU#323161", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/323161" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-6270", "datePublished": "2012-12-20T11:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T21:28:39.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0766 (GCVE-0-2012-0766)
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-08-06 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "79245", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/79245" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-25T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "79245", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/79245" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0766", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "79245", "refsource": "OSVDB", "url": "http://osvdb.org/79245" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0766", "datePublished": "2012-02-15T01:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2116 (GCVE-0-2011-2116)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2116", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2877 (GCVE-0-2010-2877)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09" }, { "name": "20100824 TPTI-10-09: Adobe Shockwave CSWV Chunk Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513296/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11895", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09" }, { "name": "20100824 TPTI-10-09: Adobe Shockwave CSWV Chunk Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513296/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11895", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2877", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09" }, { "name": "20100824 TPTI-10-09: Adobe Shockwave CSWV Chunk Memory Corruption Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513296/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11895", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2877", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0500 (GCVE-0-2014-0500)
Vulnerability from cvelistv5
Published
2014-02-12 02:00
Modified
2024-08-06 09:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:19.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "65490", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65490" }, { "name": "adobe-cve20140500-code-exec(91007)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" }, { "name": "103157", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/103157" }, { "name": "56740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029740" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-02T19:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "65490", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65490" }, { "name": "adobe-cve20140500-code-exec(91007)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" }, { "name": "103157", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/103157" }, { "name": "56740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029740" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2014-0500", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "65490", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65490" }, { "name": "adobe-cve20140500-code-exec(91007)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" }, { "name": "103157", "refsource": "OSVDB", "url": "http://osvdb.org/103157" }, { "name": "56740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029740" }, { "name": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2014-0500", "datePublished": "2014-02-12T02:00:00", "dateReserved": "2013-12-20T00:00:00", "dateUpdated": "2024-08-06T09:20:19.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2033 (GCVE-0-2012-2033)
Vulnerability from cvelistv5
Published
2012-05-09 01:00
Modified
2024-08-06 19:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "adobe-shockwave-file-ce(75462)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T14:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "adobe-shockwave-file-ce(75462)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2033", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53420" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "adobe-shockwave-file-ce(75462)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2033", "datePublished": "2012-05-09T01:00:00", "dateReserved": "2012-04-02T00:00:00", "dateUpdated": "2024-08-06T19:17:27.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2109 (GCVE-0-2011-2109)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple integer overflows in Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:15.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73033", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73033" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-07T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73033", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73033" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2109", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73033", "refsource": "OSVDB", "url": "http://osvdb.org/73033" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2109", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:15.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-5121 (GCVE-0-2015-5121)
Vulnerability from cvelistv5
Published
2015-07-14 23:00
Modified
2024-08-06 06:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5120.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:32:32.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032891", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032891" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5120." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-23T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1032891", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032891" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-5121", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5120." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032891", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032891" }, { "name": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-5121", "datePublished": "2015-07-14T23:00:00", "dateReserved": "2015-06-26T00:00:00", "dateUpdated": "2024-08-06T06:32:32.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0557 (GCVE-0-2011-0557)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-06 21:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a "faulty allocation" and memory corruption.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "shockwave-overflow-code-exec(65259)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65259" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46330", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46330" }, { "name": "20110208 ZDI-11-079: Adobe Shockwave Player 0xFFFFFF45 Record Count Element Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516323/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a \"faulty allocation\" and memory corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "shockwave-overflow-code-exec(65259)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65259" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46330", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46330" }, { "name": "20110208 ZDI-11-079: Adobe Shockwave Player 0xFFFFFF45 Record Count Element Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516323/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-0557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a \"faulty allocation\" and memory corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "shockwave-overflow-code-exec(65259)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65259" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46330", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46330" }, { "name": "20110208 ZDI-11-079: Adobe Shockwave Player 0xFFFFFF45 Record Count Element Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516323/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-0557", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-7101 (GCVE-0-2019-7101)
Vulnerability from cvelistv5
Published
2019-05-23 16:28
Modified
2024-08-04 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory Corruption
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:28:57", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7101", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7101", "datePublished": "2019-05-23T16:28:57", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2113 (GCVE-0-2011-2113)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in the Shockwave3DAsset component in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the Shockwave3DAsset component in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the Shockwave3DAsset component in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2113", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-3086 (GCVE-0-2017-3086)
Vulnerability from cvelistv5
Published
2017-06-20 17:00
Modified
2024-08-05 14:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory Corruption
Summary
Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Adobe Shockwave 12.2.8.198 and earlier. |
Version: Adobe Shockwave 12.2.8.198 and earlier. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:16:27.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038656", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038656" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html" }, { "name": "99019", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99019" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://fortiguard.com/zeroday/FG-VD-16-036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave 12.2.8.198 and earlier.", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Adobe Shockwave 12.2.8.198 and earlier." } ] } ], "datePublic": "2017-06-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-20T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1038656", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038656" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html" }, { "name": "99019", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99019" }, { "tags": [ "x_refsource_MISC" ], "url": "https://fortiguard.com/zeroday/FG-VD-16-036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2017-3086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave 12.2.8.198 and earlier.", "version": { "version_data": [ { "version_value": "Adobe Shockwave 12.2.8.198 and earlier." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "1038656", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038656" }, { "name": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html" }, { "name": "99019", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99019" }, { "name": "https://fortiguard.com/zeroday/FG-VD-16-036", "refsource": "MISC", "url": "https://fortiguard.com/zeroday/FG-VD-16-036" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2017-3086", "datePublished": "2017-06-20T17:00:00", "dateReserved": "2016-12-02T00:00:00", "dateUpdated": "2024-08-05T14:16:27.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1284 (GCVE-0-2010-1284)
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6638", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638" }, { "name": "40091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40091" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6638", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638" }, { "name": "40091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40091" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1284", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6638", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638" }, { "name": "40091", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40091" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1284", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-2186 (GCVE-0-2009-2186)
Vulnerability from cvelistv5
Published
2009-06-24 22:00
Modified
2024-08-07 05:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.0.0.465 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2009-1860, related to an older issue that "was previously resolved in Shockwave Player 11.0.0.465."
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:44:55.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.0.0.465 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2009-1860, related to an older issue that \"was previously resolved in Shockwave Player 11.0.0.465.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-06-30T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.0.0.465 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2009-1860, related to an older issue that \"was previously resolved in Shockwave Player 11.0.0.465.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb09-08.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2186", "datePublished": "2009-06-24T22:00:00", "dateReserved": "2009-06-24T00:00:00", "dateUpdated": "2024-08-07T05:44:55.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0319 (GCVE-0-2011-0319)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:07.909Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0319", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0319", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:07.909Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4084 (GCVE-0-2010-4084)
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:36.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12265", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12265", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4084", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12265", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4084", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:36.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1280 (GCVE-0-2010-1280)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file, related to (1) an erroneous dereference and (2) a certain Shock.dir file.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100511 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100512 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511257/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zeroscience.mk/codes/shockwave_mem.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7184", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file, related to (1) an erroneous dereference and (2) a certain Shock.dir file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100511 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100512 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511257/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zeroscience.mk/codes/shockwave_mem.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7184", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1280", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file, related to (1) an erroneous dereference and (2) a certain Shock.dir file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "20100511 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100512 [CAL-20100204-3]Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511257/100/0/threaded" }, { "name": "http://www.zeroscience.mk/codes/shockwave_mem.txt", "refsource": "MISC", "url": "http://www.zeroscience.mk/codes/shockwave_mem.txt" }, { "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php", "refsource": "MISC", "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7184", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1280", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-5333 (GCVE-0-2013-5333)
Vulnerability from cvelistv5
Published
2013-12-11 15:00
Modified
2024-08-06 17:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:06:52.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-11T12:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-5333", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-5333", "datePublished": "2013-12-11T15:00:00", "dateReserved": "2013-08-20T00:00:00", "dateUpdated": "2024-08-06T17:06:52.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4092 (GCVE-0-2010-4092)
Vulnerability from cvelistv5
Published
2010-11-05 20:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Use-after-free vulnerability in an unspecified compatibility component in Adobe Shockwave Player before 11.5.9.620 allows user-assisted remote attackers to execute arbitrary code via a crafted web site, related to the Shockwave Settings window and an unloaded library. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.238Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "68982", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/68982" }, { "name": "42112", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42112" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "44617", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/44617" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "oval:org.mitre.oval:def:11548", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548" }, { "name": "adobe-shockwave-settings-code-execution(62978)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62978" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in an unspecified compatibility component in Adobe Shockwave Player before 11.5.9.620 allows user-assisted remote attackers to execute arbitrary code via a crafted web site, related to the Shockwave Settings window and an unloaded library. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "68982", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/68982" }, { "name": "42112", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42112" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "44617", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/44617" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "oval:org.mitre.oval:def:11548", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548" }, { "name": "adobe-shockwave-settings-code-execution(62978)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62978" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4092", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in an unspecified compatibility component in Adobe Shockwave Player before 11.5.9.620 allows user-assisted remote attackers to execute arbitrary code via a crafted web site, related to the Shockwave Settings window and an unloaded library. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "68982", "refsource": "OSVDB", "url": "http://osvdb.org/68982" }, { "name": "42112", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42112" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "44617", "refsource": "BID", "url": "http://www.securityfocus.com/bid/44617" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "oval:org.mitre.oval:def:11548", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548" }, { "name": "adobe-shockwave-settings-code-execution(62978)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62978" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4092", "datePublished": "2010-11-05T20:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.238Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0127 (GCVE-0-2010-0127)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted FFFFFF45h Shockwave 3D blocks in a Shockwave file.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:54.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7477", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player 3D Parsing Memory Corruption", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511260/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-17/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted FFFFFF45h Shockwave 3D blocks in a Shockwave file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7477", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player 3D Parsing Memory Corruption", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511260/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-17/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted FFFFFF45h Shockwave 3D blocks in a Shockwave file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7477", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player 3D Parsing Memory Corruption", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511260/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2010-17/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-17/" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0127", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:54.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-6681 (GCVE-0-2015-6681)
Vulnerability from cvelistv5
Published
2015-09-09 00:00
Modified
2024-08-06 07:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1033486", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033486" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1033486", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033486" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-07" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-6681", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1033486", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033486" }, { "name": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-07" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-6681", "datePublished": "2015-09-09T00:00:00", "dateReserved": "2015-08-26T00:00:00", "dateUpdated": "2024-08-06T07:29:24.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1287 (GCVE-0-2010-1287)
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6803", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6803", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1287", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:6803", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1287", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2873 (GCVE-0-2010-2873)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12042", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042" }, { "name": "20100824 ZDI-10-162: Adobe Shockwave Director rcsL Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513307/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162" }, { "name": "42682", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42682" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12042", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042" }, { "name": "20100824 ZDI-10-162: Adobe Shockwave Director rcsL Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513307/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162" }, { "name": "42682", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42682" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2873", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12042", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042" }, { "name": "20100824 ZDI-10-162: Adobe Shockwave Director rcsL Chunk Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513307/100/0/threaded" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-162", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162" }, { "name": "42682", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42682" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2873", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2124 (GCVE-0-2011-2124)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, and CVE-2011-2128.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "48294", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48294" }, { "name": "adobe-player-unspec-ce(68048)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68048" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73019", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73019" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, and CVE-2011-2128." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "48294", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48294" }, { "name": "adobe-player-unspec-ce(68048)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68048" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73019", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73019" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2124", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, and CVE-2011-2128." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "48294", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48294" }, { "name": "adobe-player-unspec-ce(68048)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68048" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73019", "refsource": "OSVDB", "url": "http://osvdb.org/73019" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2124", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2118 (GCVE-0-2011-2118)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The FLV ASSET Xtra component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to an "input validation vulnerability."
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The FLV ASSET Xtra component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to an \"input validation vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FLV ASSET Xtra component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to an \"input validation vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2118", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-2983 (GCVE-0-2017-2983)
Vulnerability from cvelistv5
Published
2017-03-14 16:00
Modified
2024-08-05 14:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Insecure Library Loading (DLL hijacking)
Summary
Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Adobe Shockwave 12.2.7.197 and earlier. |
Version: Adobe Shockwave 12.2.7.197 and earlier. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:09:18.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html" }, { "name": "96863", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96863" }, { "name": "1037993", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037993" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave 12.2.7.197 and earlier.", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Adobe Shockwave 12.2.7.197 and earlier." } ] } ], "datePublic": "2017-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Insecure Library Loading (DLL hijacking)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-14T09:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html" }, { "name": "96863", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96863" }, { "name": "1037993", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037993" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2017-2983", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave 12.2.7.197 and earlier.", "version": { "version_data": [ { "version_value": "Adobe Shockwave 12.2.7.197 and earlier." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insecure Library Loading (DLL hijacking)" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html" }, { "name": "96863", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96863" }, { "name": "1037993", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037993" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2017-2983", "datePublished": "2017-03-14T16:00:00", "dateReserved": "2016-12-02T00:00:00", "dateUpdated": "2024-08-05T14:09:18.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4196 (GCVE-0-2010-4196)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.713Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "46338", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46338" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "46338", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46338" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4196", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#189929", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "46338", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46338" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4196", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1384 (GCVE-0-2013-1384)
Vulnerability from cvelistv5
Published
2013-04-10 01:00
Modified
2024-09-17 03:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1386.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.045Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1386." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-10T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1384", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1386." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1384", "datePublished": "2013-04-10T01:00:00Z", "dateReserved": "2013-01-16T00:00:00Z", "dateUpdated": "2024-09-17T03:54:57.773Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1286 (GCVE-0-2010-1286)
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7269", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7269", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1286", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7269", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1286", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2046 (GCVE-0-2012-2046)
Vulnerability from cvelistv5
Published
2012-08-15 10:00
Modified
2024-09-16 17:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.747Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-15T10:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2046", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2046", "datePublished": "2012-08-15T10:00:00Z", "dateReserved": "2012-04-02T00:00:00Z", "dateUpdated": "2024-09-16T17:49:06.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4188 (GCVE-0-2010-4188)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46319", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46319" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-01: Adobe Shockwave dirapi.dll IFWV Trusted Offset Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46319", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46319" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-01: Adobe Shockwave dirapi.dll IFWV Trusted Offset Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4188", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46319", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46319" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-01: Adobe Shockwave dirapi.dll IFWV Trusted Offset Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4188", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2588 (GCVE-0-2010-2588)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 02:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46318", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46318" }, { "name": "adobe-director-ce(65244)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65244" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "46318", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46318" }, { "name": "adobe-director-ce(65244)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65244" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2588", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46318", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46318" }, { "name": "adobe-director-ce(65244)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65244" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2588", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2112 (GCVE-0-2011-2112)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in IML32.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in IML32.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in IML32.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2112", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:17.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2031 (GCVE-0-2012-2031)
Vulnerability from cvelistv5
Published
2012-05-09 01:00
Modified
2024-08-06 19:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.883Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "asp-memory-code-exec(75460)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T14:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "asp-memory-code-exec(75460)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49086" }, { "name": "1027037", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53420" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "name": "asp-memory-code-exec(75460)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2031", "datePublished": "2012-05-09T01:00:00", "dateReserved": "2012-04-02T00:00:00", "dateUpdated": "2024-08-06T19:17:27.883Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-7100 (GCVE-0-2019-7100)
Vulnerability from cvelistv5
Published
2019-05-23 16:29
Modified
2024-08-04 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory Corruption
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:29:37", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7100", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7100", "datePublished": "2019-05-23T16:29:37", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4194 (GCVE-0-2010-4194)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.756Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46335", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46335" }, { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "46335", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46335" }, { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4194", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46335", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46335" }, { "name": "VU#189929", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4194", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-4003 (GCVE-0-2009-4003)
Vulnerability from cvelistv5
Published
2010-01-21 19:00
Modified
2024-08-07 06:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20100120 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/509053/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2009-63/" }, { "name": "37888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37888" }, { "name": "1023481", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8538", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-1/" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player Four Integer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/509055/100/0/threaded" }, { "name": "37872", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37872" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2009-62/" }, { "name": "ADV-2010-0171", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Two Integer Overflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/509058/100/0/threaded" }, { "name": "shockwave-shockwave-bo(55759)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55759" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "20100120 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/509053/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2009-63/" }, { "name": "37888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37888" }, { "name": "1023481", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8538", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-1/" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player Four Integer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/509055/100/0/threaded" }, { "name": "37872", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37872" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2009-62/" }, { "name": "ADV-2010-0171", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Two Integer Overflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/509058/100/0/threaded" }, { "name": "shockwave-shockwave-bo(55759)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55759" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2009-4003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20100120 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/509053/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2009-63/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2009-63/" }, { "name": "37888", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37888" }, { "name": "1023481", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8538", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538" }, { "name": "http://secunia.com/secunia_research/2010-1/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-1/" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player Four Integer Overflow Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/509055/100/0/threaded" }, { "name": "37872", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37872" }, { "name": "http://secunia.com/secunia_research/2009-62/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2009-62/" }, { "name": "ADV-2010-0171", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-03.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Two Integer Overflows", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/509058/100/0/threaded" }, { "name": "shockwave-shockwave-bo(55759)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55759" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2009-4003", "datePublished": "2010-01-21T19:00:00", "dateReserved": "2009-11-19T00:00:00", "dateUpdated": "2024-08-07T06:45:50.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1288 (GCVE-0-2010-1288)
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "oval:org.mitre.oval:def:7543", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "oval:org.mitre.oval:def:7543", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1288", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "oval:org.mitre.oval:def:7543", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1288", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2423 (GCVE-0-2011-2423)
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 23:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
msvcr90.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "74429", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/74429" }, { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "asp-msvcr90-code-execution(69133)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "msvcr90.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "74429", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/74429" }, { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "asp-msvcr90-code-execution(69133)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2423", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "msvcr90.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "74429", "refsource": "OSVDB", "url": "http://osvdb.org/74429" }, { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "asp-msvcr90-code-execution(69133)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2423", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-3348 (GCVE-0-2013-3348)
Vulnerability from cvelistv5
Published
2013-07-10 10:00
Modified
2024-08-06 16:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1028758", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1028758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-08-20T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1028758", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1028758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-3348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1028758", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1028758" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-18.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-3348", "datePublished": "2013-07-10T10:00:00", "dateReserved": "2013-05-06T00:00:00", "dateUpdated": "2024-08-06T16:07:37.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2882 (GCVE-0-2010-2882)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.574Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12069", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2882", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513339/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12069", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2882", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513339/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2882", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12069", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2882", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513339/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2882", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3466 (GCVE-0-2009-3466)
Vulnerability from cvelistv5
Published
2009-11-04 15:00
Modified
2024-08-07 06:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an "invalid string length vulnerability." NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:09.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "shockwave-string-code-execution(54121)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54121" }, { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6395", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an \"invalid string length vulnerability.\" NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "shockwave-string-code-execution(54121)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54121" }, { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6395", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an \"invalid string length vulnerability.\" NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "shockwave-string-code-execution(54121)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54121" }, { "name": "36905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36905" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-16.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6395", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395" }, { "name": "ADV-2009-3134", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023123" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3466", "datePublished": "2009-11-04T15:00:00", "dateReserved": "2009-09-29T00:00:00", "dateUpdated": "2024-08-07T06:31:09.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2125 (GCVE-0-2011-2125)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "73015", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73015" }, { "name": "48308", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48308" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "shockwave-player-dirapix-bo(68049)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "73015", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73015" }, { "name": "48308", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48308" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "shockwave-player-dirapix-bo(68049)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68049" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "73015", "refsource": "OSVDB", "url": "http://osvdb.org/73015" }, { "name": "48308", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48308" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "shockwave-player-dirapix-bo(68049)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68049" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2125", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0986 (GCVE-0-2010-0986)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 does not properly process asset entries, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted Shockwave file.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:06:52.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-34/" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Asset Entry Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511264/100/0/threaded" }, { "name": "40086", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40086" }, { "name": "oval:org.mitre.oval:def:6967", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly process asset entries, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted Shockwave file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-34/" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Asset Entry Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511264/100/0/threaded" }, { "name": "40086", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40086" }, { "name": "oval:org.mitre.oval:def:6967", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0986", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly process asset entries, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted Shockwave file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "http://secunia.com/secunia_research/2010-34/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-34/" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Asset Entry Parsing Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511264/100/0/threaded" }, { "name": "40086", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40086" }, { "name": "oval:org.mitre.oval:def:6967", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0986", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-03-18T00:00:00", "dateUpdated": "2024-08-07T01:06:52.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-7099 (GCVE-0-2019-7099)
Vulnerability from cvelistv5
Published
2019-05-23 16:30
Modified
2024-08-04 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory Corruption
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:30:14", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7099", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7099", "datePublished": "2019-05-23T16:30:14", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2108 (GCVE-0-2011-2108)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to a "design flaw."
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:15.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "48311", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48311" }, { "name": "shockwave-design-code-exec(68033)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68033" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73012", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73012" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to a \"design flaw.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "48311", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48311" }, { "name": "shockwave-design-code-exec(68033)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68033" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73012", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73012" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to a \"design flaw.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "48311", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48311" }, { "name": "shockwave-design-code-exec(68033)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68033" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73012", "refsource": "OSVDB", "url": "http://osvdb.org/73012" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2108", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:15.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2881 (GCVE-0-2010-2881)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.655Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11614", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2881", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513328/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11614", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2881", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513328/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2881", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11614", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2881", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513328/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2881", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2868 (GCVE-0-2010-2868)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2868", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513333/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11540", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2868", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513333/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11540", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2868", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2868", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513333/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11540", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2868", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5941 (GCVE-0-2007-5941)
Vulnerability from cvelistv5
Published
2007-11-14 01:00
Modified
2024-08-07 15:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "4613", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/4613" }, { "name": "26388", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26388" }, { "name": "adobe-shockwave-swctl-bo(38359)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38359" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "4613", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/4613" }, { "name": "26388", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26388" }, { "name": "adobe-shockwave-swctl-bo(38359)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38359" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5941", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "4613", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/4613" }, { "name": "26388", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26388" }, { "name": "adobe-shockwave-swctl-bo(38359)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38359" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5941", "datePublished": "2007-11-14T01:00:00", "dateReserved": "2007-11-13T00:00:00", "dateUpdated": "2024-08-07T15:47:00.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4306 (GCVE-0-2010-4306)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46333", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46333" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46333", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46333" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46333", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46333" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4306", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-22T00:00:00", "dateUpdated": "2024-08-07T03:43:14.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1291 (GCVE-0-2010-1291)
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:18.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7183", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7183", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1291", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7183", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1291", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:18.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-6680 (GCVE-0-2015-6680)
Vulnerability from cvelistv5
Published
2015-09-09 00:00
Modified
2024-08-06 07:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1033486", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033486" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T16:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1033486", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033486" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-07" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-6680", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1033486", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033486" }, { "name": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "name": "GLSA-201509-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201509-07" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-6680", "datePublished": "2015-09-09T00:00:00", "dateReserved": "2015-08-26T00:00:00", "dateUpdated": "2024-08-06T07:29:24.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-3359 (GCVE-0-2013-3359)
Vulnerability from cvelistv5
Published
2013-09-11 23:00
Modified
2024-09-17 04:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3360.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3360." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-11T23:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-3359", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3360." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-3359", "datePublished": "2013-09-11T23:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-17T04:18:55.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0501 (GCVE-0-2014-0501)
Vulnerability from cvelistv5
Published
2014-02-12 02:00
Modified
2024-08-06 09:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:19.398Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-cve20140501-code-exec(91008)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" }, { "name": "56740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029740" }, { "name": "65493", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65493" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "name": "103158", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/103158" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-02T19:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-cve20140501-code-exec(91008)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" }, { "name": "56740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029740" }, { "name": "65493", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65493" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "name": "103158", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/103158" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2014-0501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-cve20140501-code-exec(91008)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" }, { "name": "56740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56740" }, { "name": "1029740", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029740" }, { "name": "65493", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65493" }, { "name": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "name": "103158", "refsource": "OSVDB", "url": "http://osvdb.org/103158" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2014-0501", "datePublished": "2014-02-12T02:00:00", "dateReserved": "2013-12-20T00:00:00", "dateUpdated": "2024-08-06T09:20:19.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0130 (GCVE-0-2010-0130)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via a crafted .dir (aka Director) file.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:53.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511263/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-22/" }, { "name": "40084", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40084" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7108", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via a crafted .dir (aka Director) file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511263/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-22/" }, { "name": "40084", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40084" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7108", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0130", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via a crafted .dir (aka Director) file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511263/100/0/threaded" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "http://secunia.com/secunia_research/2010-22/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-22/" }, { "name": "40084", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40084" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7108", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0130", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:53.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0555 (GCVE-0-2011-0555)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-06 21:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110209 TPTI-11-02: Adobe Shockwave TextXtra Invalid Seek Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516333/100/0/threaded" }, { "name": "shockwave-memory-code-execution(65257)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65257" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46327", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46327" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "20110209 TPTI-11-02: Adobe Shockwave TextXtra Invalid Seek Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516333/100/0/threaded" }, { "name": "shockwave-memory-code-execution(65257)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65257" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46327", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46327" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-0555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110209 TPTI-11-02: Adobe Shockwave TextXtra Invalid Seek Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516333/100/0/threaded" }, { "name": "shockwave-memory-code-execution(65257)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65257" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46327", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46327" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-0555", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2587 (GCVE-0-2010-2587)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 02:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.107Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "shockwave-director-ce(65243)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65243" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46316", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46316" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "shockwave-director-ce(65243)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65243" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46316", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46316" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2587", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "shockwave-director-ce(65243)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65243" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "46316", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46316" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2587", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.107Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0771 (GCVE-0-2012-0771)
Vulnerability from cvelistv5
Published
2018-02-19 19:00
Modified
2024-08-06 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-19T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0771", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "https://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0771", "datePublished": "2018-02-19T19:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4193 (GCVE-0-2010-4193)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46334", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46334" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46334", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46334" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4193", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#189929", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46334", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46334" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4193", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1385 (GCVE-0-2013-1385)
Vulnerability from cvelistv5
Published
2013-04-10 01:00
Modified
2024-09-16 18:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.2.122 does not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 does not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-10T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1385", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.2.122 does not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1385", "datePublished": "2013-04-10T01:00:00Z", "dateReserved": "2013-01-16T00:00:00Z", "dateUpdated": "2024-09-16T18:17:46.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1386 (GCVE-0-2013-1386)
Vulnerability from cvelistv5
Published
2013-04-10 01:00
Modified
2024-09-16 16:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-10T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1386", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1386", "datePublished": "2013-04-10T01:00:00Z", "dateReserved": "2013-01-16T00:00:00Z", "dateUpdated": "2024-09-16T16:24:02.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2447 (GCVE-0-2011-2447)
Vulnerability from cvelistv5
Published
2011-11-08 22:00
Modified
2024-08-06 23:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.941Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2447", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-27.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026288" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2447", "datePublished": "2011-11-08T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.941Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-7104 (GCVE-0-2019-7104)
Vulnerability from cvelistv5
Published
2019-05-23 15:45
Modified
2024-08-04 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory Corruption
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T15:45:58", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7104", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7104", "datePublished": "2019-05-23T15:45:58", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-5334 (GCVE-0-2013-5334)
Vulnerability from cvelistv5
Published
2013-12-11 15:00
Modified
2024-08-06 17:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5333.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:06:52.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5333." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-11T12:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-5334", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5333." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-5334", "datePublished": "2013-12-11T15:00:00", "dateReserved": "2013-08-20T00:00:00", "dateUpdated": "2024-08-06T17:06:52.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2874 (GCVE-0-2010-2874)
Vulnerability from cvelistv5
Published
2010-09-07 17:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11924", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11924", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2874", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11924", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2874", "datePublished": "2010-09-07T17:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0335 (GCVE-0-2011-0335)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2011-0335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2011-0335", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:08.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2589 (GCVE-0-2010-2589)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 02:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "shockwave-player-director-code-exec(65245)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65245" }, { "name": "46329", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46329" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "shockwave-player-director-code-exec(65245)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65245" }, { "name": "46329", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46329" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2589", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "shockwave-player-director-code-exec(65245)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65245" }, { "name": "46329", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46329" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2589", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-7103 (GCVE-0-2019-7103)
Vulnerability from cvelistv5
Published
2019-05-23 16:26
Modified
2024-08-04 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory Corruption
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:26:31", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7103", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7103", "datePublished": "2019-05-23T16:26:31", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-5273 (GCVE-0-2012-5273)
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.414Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "86541", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86541" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "56187", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56187" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-01-26T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "86541", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86541" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "56187", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56187" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5273", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "86541", "refsource": "OSVDB", "url": "http://osvdb.org/86541" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "56187", "refsource": "BID", "url": "http://www.securityfocus.com/bid/56187" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5273", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.414Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0760 (GCVE-0-2012-0760)
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-09-16 16:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0760", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0760", "datePublished": "2012-02-15T01:00:00Z", "dateReserved": "2012-01-18T00:00:00Z", "dateUpdated": "2024-09-16T16:48:56.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4086 (GCVE-0-2010-4086)
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4086", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514578/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12030", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4086", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514578/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12030", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4086", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514578/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12030", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4086", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0320 (GCVE-0-2011-0320)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:07.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0320", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0320", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:07.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4309 (GCVE-0-2010-4309)
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-07 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4308.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.660Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4308." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4309", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4308." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4309", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2010-11-22T00:00:00", "dateUpdated": "2024-08-07T03:43:14.660Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0556 (GCVE-0-2011-0556)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-06 21:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "shocwave-player-fontxtra-code-exec(65258)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65258" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46328", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46328" }, { "name": "20110209 TPTI-11-03: Adobe Shockwave Font Xtra String Decoding Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516336/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "shocwave-player-fontxtra-code-exec(65258)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65258" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46328", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46328" }, { "name": "20110209 TPTI-11-03: Adobe Shockwave Font Xtra String Decoding Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516336/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-0556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "shocwave-player-fontxtra-code-exec(65258)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65258" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46328", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46328" }, { "name": "20110209 TPTI-11-03: Adobe Shockwave Font Xtra String Decoding Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516336/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-0556", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3655 (GCVE-0-2010-3655)
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12077", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12077", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-3655", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12077", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-3655", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:53.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2128 (GCVE-0-2011-2128)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "48290", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48290" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-memory-ce(68052)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68052" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73027", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "48290", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48290" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-memory-ce(68052)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68052" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73027", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73027" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "48290", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48290" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-memory-ce(68052)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68052" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73027", "refsource": "OSVDB", "url": "http://osvdb.org/73027" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2128", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4189 (GCVE-0-2010-4189)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-04: Adobe Shockwave GIF Logical Screen Descriptor Parsing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516334/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04" }, { "name": "46320", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46320" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-04: Adobe Shockwave GIF Logical Screen Descriptor Parsing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516334/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04" }, { "name": "46320", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46320" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4189", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "20110209 TPTI-11-04: Adobe Shockwave GIF Logical Screen Descriptor Parsing Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516334/100/0/threaded" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04" }, { "name": "46320", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46320" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4189", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4308 (GCVE-0-2010-4308)
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-07 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4309.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.600Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4309." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4309." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4308", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2010-11-22T00:00:00", "dateUpdated": "2024-08-07T03:43:14.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-5120 (GCVE-0-2015-5120)
Vulnerability from cvelistv5
Published
2015-07-14 23:00
Modified
2024-08-06 06:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5121.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:32:32.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032891", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032891" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5121." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-23T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1032891", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032891" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-5120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5121." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032891", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032891" }, { "name": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-5120", "datePublished": "2015-07-14T23:00:00", "dateReserved": "2015-06-26T00:00:00", "dateUpdated": "2024-08-06T06:32:32.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0129 (GCVE-0-2010-0129)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:53.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511256/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html" }, { "name": "40082", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40082" }, { "name": "20100511 Abobe Shockwave Player Heap Memory Indexing Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-20/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Array Indexing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511262/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7134", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511256/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html" }, { "name": "40082", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40082" }, { "name": "20100511 Abobe Shockwave Player Heap Memory Indexing Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-20/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Array Indexing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511262/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7134", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0129", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "20100512 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511256/100/0/threaded" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CAL-20100204-2]Adobe Shockwave Player Director File Parsing integer overflow vulnerability", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html" }, { "name": "40082", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40082" }, { "name": "20100511 Abobe Shockwave Player Heap Memory Indexing Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "http://secunia.com/secunia_research/2010-20/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-20/" }, { "name": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html", "refsource": "MISC", "url": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Array Indexing Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511262/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7134", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0129", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:53.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4087 (GCVE-0-2010-4087)
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with a crafted mmap record containing an invalid length of a VSWV entry, a different vulnerability than CVE-2010-4089.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12093", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4087", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514581/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with a crafted mmap record containing an invalid length of a VSWV entry, a different vulnerability than CVE-2010-4089." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12093", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4087", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514581/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with a crafted mmap record containing an invalid length of a VSWV entry, a different vulnerability than CVE-2010-4089." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12093", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4087", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514581/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4087", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2047 (GCVE-0-2012-2047)
Vulnerability from cvelistv5
Published
2012-08-15 10:00
Modified
2024-09-17 02:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-15T10:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2047", "datePublished": "2012-08-15T10:00:00Z", "dateReserved": "2012-04-02T00:00:00Z", "dateUpdated": "2024-09-17T02:20:48.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2876 (GCVE-0-2010-2876)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20100824 ZDI-10-164: Adobe Shockwave Player Director File FFFFFF88 Record Processing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513312/100/0/threaded" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11805", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-164" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "20100824 ZDI-10-164: Adobe Shockwave Player Director File FFFFFF88 Record Processing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513312/100/0/threaded" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11805", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-164" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2876", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20100824 ZDI-10-164: Adobe Shockwave Player Director File FFFFFF88 Record Processing Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513312/100/0/threaded" }, { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11805", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-164", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-164" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2876", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4187 (GCVE-0-2010-4187)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.630Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46317", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46317" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110208 Adobe Shockwave Player Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "46317", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46317" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110208 Adobe Shockwave Player Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46317", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46317" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110208 Adobe Shockwave Player Memory Corruption Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4187", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-0636 (GCVE-0-2013-0636)
Vulnerability from cvelistv5
Published
2013-02-13 21:00
Modified
2024-08-06 14:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-04T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-0636", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-06.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-0636", "datePublished": "2013-02-13T21:00:00", "dateReserved": "2012-12-18T00:00:00", "dateUpdated": "2024-08-06T14:33:05.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4090 (GCVE-0-2010-4090)
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12199", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12199", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4090", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:12199", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4090", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0764 (GCVE-0-2012-0764)
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-08-06 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.275Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52004", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52004" }, { "name": "79244", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/79244" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-25T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "52004", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52004" }, { "name": "79244", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/79244" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0764", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "52004", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52004" }, { "name": "79244", "refsource": "OSVDB", "url": "http://osvdb.org/79244" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0764", "datePublished": "2012-02-15T01:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.275Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2867 (GCVE-0-2010-2867)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a "pointer offset vulnerability."
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12021", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a \"pointer offset vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12021", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a \"pointer offset vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" }, { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:12021", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 TPTI-10-14: Adobe Shockwave Director rcsL Chunk Pointer Offset Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2867", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2119 (GCVE-0-2011-2119)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2119", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0759 (GCVE-0-2012-0759)
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-08-06 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.201Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-19T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0759", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0759", "datePublished": "2012-02-15T01:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4089 (GCVE-0-2010-4089)
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file containing "duplicated LCSM entries in mmap record," a different vulnerability than CVE-2010-4087.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:36.838Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:11748", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748" }, { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4089", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514582/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file containing \"duplicated LCSM entries in mmap record,\" a different vulnerability than CVE-2010-4087." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "oval:org.mitre.oval:def:11748", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748" }, { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4089", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514582/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4089", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file containing \"duplicated LCSM entries in mmap record,\" a different vulnerability than CVE-2010-4087." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11748", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748" }, { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4089", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514582/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4089", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:36.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2029 (GCVE-0-2012-2029)
Vulnerability from cvelistv5
Published
2012-05-09 01:00
Modified
2024-08-06 19:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49086" }, { "name": "asp-unspecified-ce(75458)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T14:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49086" }, { "name": "asp-unspecified-ce(75458)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49086" }, { "name": "asp-unspecified-ce(75458)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458" }, { "name": "1027037", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53420" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2029", "datePublished": "2012-05-09T01:00:00", "dateReserved": "2012-04-02T00:00:00", "dateUpdated": "2024-08-06T19:17:27.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0762 (GCVE-0-2012-0762)
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-08-06 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "79242", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/79242" }, { "name": "52002", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52002" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "shockwave-3d-code-exec(73175)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73175" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "79242", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/79242" }, { "name": "52002", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52002" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "shockwave-3d-code-exec(73175)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73175" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "79242", "refsource": "OSVDB", "url": "http://osvdb.org/79242" }, { "name": "52002", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52002" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "shockwave-3d-code-exec(73175)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73175" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0762", "datePublished": "2012-02-15T01:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.263Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2117 (GCVE-0-2011-2117)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2117", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4175 (GCVE-0-2012-4175)
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-5273.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86540", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86540" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124175-bo(79547)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79547" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-5273." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86540", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86540" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124175-bo(79547)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79547" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4175", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-5273." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#872545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86540", "refsource": "OSVDB", "url": "http://osvdb.org/86540" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124175-bo(79547)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79547" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4175", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2419 (GCVE-0-2011-2419)
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 23:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IML32.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.817Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2419", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-4002 (GCVE-0-2009-4002)
Vulnerability from cvelistv5
Published
2010-01-21 19:00
Modified
2024-08-07 06:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37870", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37870" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/509062/100/0/threaded" }, { "name": "37888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37888" }, { "name": "shockwave-3d-bo(55758)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55758" }, { "name": "1023481", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8311", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311" }, { "name": "ADV-2010-0171", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2009-61/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "37870", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37870" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/509062/100/0/threaded" }, { "name": "37888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37888" }, { "name": "shockwave-3d-bo(55758)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55758" }, { "name": "1023481", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8311", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311" }, { "name": "ADV-2010-0171", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2009-61/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2009-4002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37870", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37870" }, { "name": "20100120 Secunia Research: Adobe Shockwave Player 3D Model Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/509062/100/0/threaded" }, { "name": "37888", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37888" }, { "name": "shockwave-3d-bo(55758)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55758" }, { "name": "1023481", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023481" }, { "name": "oval:org.mitre.oval:def:8311", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311" }, { "name": "ADV-2010-0171", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "name": "http://secunia.com/secunia_research/2009-61/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2009-61/" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-03.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2009-4002", "datePublished": "2010-01-21T19:00:00", "dateReserved": "2009-11-19T00:00:00", "dateUpdated": "2024-08-07T06:45:50.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-3360 (GCVE-0-2013-3360)
Vulnerability from cvelistv5
Published
2013-09-11 23:00
Modified
2024-09-16 20:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:07:37.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-11T23:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-3360", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-3360", "datePublished": "2013-09-11T23:00:00Z", "dateReserved": "2013-05-06T00:00:00Z", "dateUpdated": "2024-09-16T20:52:46.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2122 (GCVE-0-2011-2122)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to rcsL substructures, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2119.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110614 [BGA - SignalSEC Advisory]:Adobe Shockwave Player Remote Code Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518439/100/0/threaded" }, { "name": "73029", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73029" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48297", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48297" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to rcsL substructures, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2119." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "20110614 [BGA - SignalSEC Advisory]:Adobe Shockwave Player Remote Code Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518439/100/0/threaded" }, { "name": "73029", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73029" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48297", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48297" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2122", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to rcsL substructures, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2119." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110614 [BGA - SignalSEC Advisory]:Adobe Shockwave Player Remote Code Execution", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518439/100/0/threaded" }, { "name": "73029", "refsource": "OSVDB", "url": "http://osvdb.org/73029" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48297", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48297" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2122", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0505 (GCVE-0-2014-0505)
Vulnerability from cvelistv5
Published
2014-03-14 10:00
Modified
2024-08-06 09:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:19.346Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-14T05:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2014-0505", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2014-0505", "datePublished": "2014-03-14T10:00:00", "dateReserved": "2013-12-20T00:00:00", "dateUpdated": "2024-08-06T09:20:19.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2866 (GCVE-0-2010-2866)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an "undocumented structure" and the tSAC chunk in a Director movie.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11932", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932" }, { "name": "20100824 TPTI-10-13: Adobe Shockwave Director tSAC Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513301/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an \"undocumented structure\" and the tSAC chunk in a Director movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11932", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932" }, { "name": "20100824 TPTI-10-13: Adobe Shockwave Director tSAC Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513301/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2866", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an \"undocumented structure\" and the tSAC chunk in a Director movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13" }, { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11932", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932" }, { "name": "20100824 TPTI-10-13: Adobe Shockwave Director tSAC Chunk Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513301/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2866", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4085 (GCVE-0-2010-4085)
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, and CVE-2010-4088.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:11518", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, and CVE-2010-4088." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:11518", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4085", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, and CVE-2010-4088." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "oval:org.mitre.oval:def:11518", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4085", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1283 (GCVE-0-2010-1283)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 does not properly parse 3D objects in .dir (aka Director) files, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a modified field in a 0xFFFFFF49 record.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7262", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/" }, { "name": "20100511 ZDI-10-088: Adobe Shockwave Player 3D Parsing Memory Corruption Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511253/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly parse 3D objects in .dir (aka Director) files, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a modified field in a 0xFFFFFF49 record." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7262", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/" }, { "name": "20100511 ZDI-10-088: Adobe Shockwave Player 3D Parsing Memory Corruption Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511253/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1283", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly parse 3D objects in .dir (aka Director) files, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a modified field in a 0xFFFFFF49 record." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:7262", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/" }, { "name": "20100511 ZDI-10-088: Adobe Shockwave Player 3D Parsing Memory Corruption Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511253/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1283", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2880 (GCVE-0-2010-2880)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.573Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2880", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513331/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "oval:org.mitre.oval:def:12012", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2880", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513331/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "oval:org.mitre.oval:def:12012", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2880", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2880", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513331/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "oval:org.mitre.oval:def:12012", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2880", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2032 (GCVE-0-2012-2032)
Vulnerability from cvelistv5
Published
2012-05-09 01:00
Modified
2024-08-06 19:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2033.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49086" }, { "name": "asp-file-code-execution(75461)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2033." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T14:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49086" }, { "name": "asp-file-code-execution(75461)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2033." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49086" }, { "name": "asp-file-code-execution(75461)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461" }, { "name": "1027037", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53420" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2032", "datePublished": "2012-05-09T01:00:00", "dateReserved": "2012-04-02T00:00:00", "dateUpdated": "2024-08-06T19:17:27.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2120 (GCVE-0-2011-2120)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2120", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:17.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0761 (GCVE-0-2012-0761)
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-08-06 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "79241", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/79241" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "adobe-shockwave-3d-code-exec(73174)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73174" }, { "name": "52001", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "79241", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/79241" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "adobe-shockwave-3d-code-exec(73174)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73174" }, { "name": "52001", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52001" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0761", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "79241", "refsource": "OSVDB", "url": "http://osvdb.org/79241" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "name": "adobe-shockwave-3d-code-exec(73174)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73174" }, { "name": "52001", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52001" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0761", "datePublished": "2012-02-15T01:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2121 (GCVE-0-2011-2121)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73034", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73034" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-07T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73034", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73034" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2121", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "73034", "refsource": "OSVDB", "url": "http://osvdb.org/73034" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2121", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-1860 (GCVE-0-2009-1860)
Vulnerability from cvelistv5
Published
2009-06-24 22:00
Modified
2024-08-07 05:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.0.600 allows remote attackers to execute arbitrary code via crafted Shockwave Player 10 content.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:27:54.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1022440", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022440" }, { "name": "35544", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35544" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "name": "35469", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35469" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.0.600 allows remote attackers to execute arbitrary code via crafted Shockwave Player 10 content." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-06-30T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1022440", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022440" }, { "name": "35544", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35544" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "name": "35469", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35469" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1860", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.0.600 allows remote attackers to execute arbitrary code via crafted Shockwave Player 10 content." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1022440", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022440" }, { "name": "35544", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35544" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-08.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "name": "35469", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35469" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1860", "datePublished": "2009-06-24T22:00:00", "dateReserved": "2009-06-01T00:00:00", "dateUpdated": "2024-08-07T05:27:54.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0128 (GCVE-0-2010-0128)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:53.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.coresecurity.com/content/adobe-director-invalid-read" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Signedness Error Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511261/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CORE-2010-0405] Adobe Director Invalid Read", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511240/100/0/threaded" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-19/" }, { "name": "oval:org.mitre.oval:def:7273", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.coresecurity.com/content/adobe-director-invalid-read" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Signedness Error Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511261/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CORE-2010-0405] Adobe Director Invalid Read", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511240/100/0/threaded" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-19/" }, { "name": "oval:org.mitre.oval:def:7273", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.coresecurity.com/content/adobe-director-invalid-read", "refsource": "MISC", "url": "http://www.coresecurity.com/content/adobe-director-invalid-read" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Signedness Error Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511261/100/0/threaded" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 [CORE-2010-0405] Adobe Director Invalid Read", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511240/100/0/threaded" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "http://secunia.com/secunia_research/2010-19/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-19/" }, { "name": "oval:org.mitre.oval:def:7273", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0128", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:53.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1292 (GCVE-0-2010-1292)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:18.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 ZDI-10-089: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511242/100/0/threaded" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7416", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 ZDI-10-089: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511242/100/0/threaded" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7416", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1292", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "20100511 ZDI-10-089: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511242/100/0/threaded" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7416", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1292", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:18.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2869 (GCVE-0-2010-2869)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11983", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2869", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513329/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11983", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2869", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513329/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2869", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11983", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2869", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513329/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2869", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2421 (GCVE-0-2011-2421)
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 23:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.848Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2421", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2421", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4174 (GCVE-0-2012-4174)
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4175, and CVE-2012-5273.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-cve20124174-bo(79546)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79546" }, { "name": "86539", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86539" }, { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4175, and CVE-2012-5273." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-cve20124174-bo(79546)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79546" }, { "name": "86539", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86539" }, { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4174", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4175, and CVE-2012-5273." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-cve20124174-bo(79546)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79546" }, { "name": "86539", "refsource": "OSVDB", "url": "http://osvdb.org/86539" }, { "name": "VU#872545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4174", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2127 (GCVE-0-2011-2127)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2128.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-shockwave-memory-ce(68051)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68051" }, { "name": "48289", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48289" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73032", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73032" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2128." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-shockwave-memory-ce(68051)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68051" }, { "name": "48289", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48289" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73032", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73032" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2128." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-shockwave-memory-ce(68051)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68051" }, { "name": "48289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48289" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "73032", "refsource": "OSVDB", "url": "http://osvdb.org/73032" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2127", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:17.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4176 (GCVE-0-2012-4176)
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86542", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86542" }, { "name": "adobe-cve20124176-code-exec(79548)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79548" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86542", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86542" }, { "name": "adobe-cve20124176-code-exec(79548)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79548" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4176", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#872545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86542", "refsource": "OSVDB", "url": "http://osvdb.org/86542" }, { "name": "adobe-cve20124176-code-exec(79548)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79548" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4176", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4191 (GCVE-0-2010-4191)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46325", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46325" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "46325", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46325" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4191", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46325", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46325" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4191", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-7649 (GCVE-0-2015-7649)
Vulnerability from cvelistv5
Published
2015-10-28 18:00
Modified
2024-08-06 07:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.2.1.171 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:58:59.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html" }, { "name": "1033990", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033990" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.1.171 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-22T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html" }, { "name": "1033990", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033990" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-7649", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.2.1.171 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html" }, { "name": "1033990", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033990" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-7649", "datePublished": "2015-10-28T18:00:00", "dateReserved": "2015-10-01T00:00:00", "dateUpdated": "2024-08-06T07:58:59.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1289 (GCVE-0-2010-1289)
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:6652", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "40087", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40087" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:6652", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "40087", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40087" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1289", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "oval:org.mitre.oval:def:6652", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "40087", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40087" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1289", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2864 (GCVE-0-2010-2864)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11913", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11913", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2864", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100825 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11913", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2864", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3653 (GCVE-0-2010-3653)
Vulnerability from cvelistv5
Published
2010-10-26 17:00
Modified
2024-08-07 03:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:53.097Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "adobe-shockwave-rcsl-code-exec(62688)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62688" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/" }, { "name": "15296", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/15296" }, { "name": "VU#402231", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/402231" }, { "name": "oval:org.mitre.oval:def:11285", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285" }, { "name": "44291", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/44291" }, { "name": "1024635", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024635" }, { "name": "ADV-2010-2752", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2752" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "adobe-shockwave-rcsl-code-exec(62688)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62688" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/" }, { "name": "15296", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/15296" }, { "name": "VU#402231", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/402231" }, { "name": "oval:org.mitre.oval:def:11285", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285" }, { "name": "44291", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/44291" }, { "name": "1024635", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024635" }, { "name": "ADV-2010-2752", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2752" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-3653", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "adobe-shockwave-rcsl-code-exec(62688)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62688" }, { "name": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/", "refsource": "MISC", "url": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/" }, { "name": "15296", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/15296" }, { "name": "VU#402231", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/402231" }, { "name": "oval:org.mitre.oval:def:11285", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285" }, { "name": "44291", "refsource": "BID", "url": "http://www.securityfocus.com/bid/44291" }, { "name": "1024635", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024635" }, { "name": "ADV-2010-2752", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2752" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-3653", "datePublished": "2010-10-26T17:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:53.097Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2115 (GCVE-0-2011-2115)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110614 Adobe Shockwave Cursor Asset tSAC Chunk Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-07-20T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "20110614 Adobe Shockwave Cursor Asset tSAC Chunk Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2115", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110614 Adobe Shockwave Cursor Asset tSAC Chunk Integer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2115", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4190 (GCVE-0-2010-4190)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds "seek" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110209 ZDI-11-080: Adobe Shockwave CSWV Chunk Substructure Offset Value Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516324/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46324", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46324" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds \"seek\" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110209 ZDI-11-080: Adobe Shockwave CSWV Chunk Substructure Offset Value Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516324/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46324", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46324" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4190", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds \"seek\" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "20110209 ZDI-11-080: Adobe Shockwave CSWV Chunk Substructure Offset Value Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516324/100/0/threaded" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "46324", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46324" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4190", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2123 (GCVE-0-2011-2123)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "20110614 Adobe Shockwave 3D Asset DEMX Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-07-20T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "20110614 Adobe Shockwave 3D Asset DEMX Integer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2123", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "20110614 Adobe Shockwave 3D Asset DEMX Integer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2123", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-7102 (GCVE-0-2019-7102)
Vulnerability from cvelistv5
Published
2019-05-23 16:30
Modified
2024-08-04 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory Corruption
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:30:43", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7102", "datePublished": "2019-05-23T16:30:43", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2582 (GCVE-0-2010-2582)
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 02:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.060Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:12078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078" }, { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"DEMX\" Chunk Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514560/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-114/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "oval:org.mitre.oval:def:12078", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078" }, { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"DEMX\" Chunk Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514560/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-114/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2582", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:12078", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078" }, { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"DEMX\" Chunk Parsing Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514560/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2010-114/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-114/" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2582", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3465 (GCVE-0-2009-3465)
Vulnerability from cvelistv5
Published
2009-11-04 15:00
Modified
2024-08-07 06:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an "invalid pointer vulnerability," a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "shockwave-invalid-pointer-code-execution(54120)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54120" }, { "name": "oval:org.mitre.oval:def:5722", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "shockwave-invalid-pointer-code-execution(54120)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54120" }, { "name": "oval:org.mitre.oval:def:5722", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3465", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36905" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-16.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "ADV-2009-3134", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "shockwave-invalid-pointer-code-execution(54120)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54120" }, { "name": "oval:org.mitre.oval:def:5722", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722" }, { "name": "1023123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023123" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3465", "datePublished": "2009-11-04T15:00:00", "dateReserved": "2009-09-29T00:00:00", "dateUpdated": "2024-08-07T06:31:10.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0987 (GCVE-0-2010-0987)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:06:52.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-50/" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Font Processing Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511265/100/0/threaded" }, { "name": "40093", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40093" }, { "name": "oval:org.mitre.oval:def:7052", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-50/" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Font Processing Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511265/100/0/threaded" }, { "name": "40093", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40093" }, { "name": "oval:org.mitre.oval:def:7052", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "http://secunia.com/secunia_research/2010-50/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-50/" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "20100512 Secunia Research: Adobe Shockwave Player Font Processing Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511265/100/0/threaded" }, { "name": "40093", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40093" }, { "name": "oval:org.mitre.oval:def:7052", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0987", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-03-18T00:00:00", "dateUpdated": "2024-08-07T01:06:52.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2448 (GCVE-0-2011-2448)
Vulnerability from cvelistv5
Published
2011-11-08 22:00
Modified
2024-08-06 23:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2446.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2446." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2448", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2446." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-27.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026288" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2448", "datePublished": "2011-11-08T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2872 (GCVE-0-2010-2872)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161" }, { "name": "oval:org.mitre.oval:def:11889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" }, { "name": "20100824 ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161" }, { "name": "oval:org.mitre.oval:def:11889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" }, { "name": "20100824 ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2872", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-161", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161" }, { "name": "oval:org.mitre.oval:def:11889", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" }, { "name": "20100824 ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2872", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1281 (GCVE-0-2010-1281)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7268", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268" }, { "name": "20100511 ZDI-10-087: Adobe Shockwave Invalid Offset Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511252/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7268", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268" }, { "name": "20100511 ZDI-10-087: Adobe Shockwave Invalid Offset Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511252/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1281", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7268", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268" }, { "name": "20100511 ZDI-10-087: Adobe Shockwave Invalid Offset Memory Corruption Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511252/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1281", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3525 (GCVE-0-2005-3525)
Vulnerability from cvelistv5
Published
2006-02-23 20:00
Modified
2024-08-07 23:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:23.056Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "23461", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23461" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html" }, { "name": "16791", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16791" }, { "name": "481", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/481" }, { "name": "ADV-2006-0716", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0716" }, { "name": "shockwave-activex-installer-bo(24914)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24914" }, { "name": "19009", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19009" }, { "name": "VU#437212", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/437212" }, { "name": "20060223 ZDI-06-002: Adobe Macromedia ShockWave Code Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/425900/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html" }, { "name": "1015673", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015673" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "23461", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23461" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html" }, { "name": "16791", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16791" }, { "name": "481", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/481" }, { "name": "ADV-2006-0716", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0716" }, { "name": "shockwave-activex-installer-bo(24914)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24914" }, { "name": "19009", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19009" }, { "name": "VU#437212", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/437212" }, { "name": "20060223 ZDI-06-002: Adobe Macromedia ShockWave Code Execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/425900/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html" }, { "name": "1015673", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015673" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3525", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "23461", "refsource": "OSVDB", "url": "http://www.osvdb.org/23461" }, { "name": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html", "refsource": "CONFIRM", "url": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html" }, { "name": "16791", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16791" }, { "name": "481", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/481" }, { "name": "ADV-2006-0716", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0716" }, { "name": "shockwave-activex-installer-bo(24914)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24914" }, { "name": "19009", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19009" }, { "name": "VU#437212", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/437212" }, { "name": "20060223 ZDI-06-002: Adobe Macromedia ShockWave Code Execution", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/425900/100/0/threaded" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html" }, { "name": "1015673", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015673" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3525", "datePublished": "2006-02-23T20:00:00", "dateReserved": "2005-11-08T00:00:00", "dateUpdated": "2024-08-07T23:17:23.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2045 (GCVE-0-2012-2045)
Vulnerability from cvelistv5
Published
2012-08-15 10:00
Modified
2024-09-17 01:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-15T10:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2045", "datePublished": "2012-08-15T10:00:00Z", "dateReserved": "2012-04-02T00:00:00Z", "dateUpdated": "2024-09-17T01:16:22.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2879 (GCVE-0-2010-2879)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.433Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12" }, { "name": "20100824 TPTI-10-12: Adobe Shockwave TextXtra Allocator Integer Overflow Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11998", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12" }, { "name": "20100824 TPTI-10-12: Adobe Shockwave TextXtra Allocator Integer Overflow Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11998", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2879", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12" }, { "name": "20100824 TPTI-10-12: Adobe Shockwave TextXtra Allocator Integer Overflow Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:11998", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2879", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4192 (GCVE-0-2010-4192)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46326", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46326" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110208 ZDI-11-078: Adobe Shockwave Player FFFFFF88 Record Count Element Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516322/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-078" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "46326", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46326" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110208 ZDI-11-078: Adobe Shockwave Player FFFFFF88 Record Count Element Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516322/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-078" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4192", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46326", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46326" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110208 ZDI-11-078: Adobe Shockwave Player FFFFFF88 Record Count Element Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516322/100/0/threaded" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-078", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-078" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4192", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-11-05T00:00:00", "dateUpdated": "2024-08-07T03:34:37.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-0635 (GCVE-0-2013-0635)
Vulnerability from cvelistv5
Published
2013-02-13 21:00
Modified
2024-08-06 14:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-05-04T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-0635", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-06.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "name": "TA13-043A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-0635", "datePublished": "2013-02-13T21:00:00", "dateReserved": "2012-12-18T00:00:00", "dateUpdated": "2024-08-06T14:33:05.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2044 (GCVE-0-2012-2044)
Vulnerability from cvelistv5
Published
2012-08-15 10:00
Modified
2024-09-16 22:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.777Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-15T10:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2044", "datePublished": "2012-08-15T10:00:00Z", "dateReserved": "2012-04-02T00:00:00Z", "dateUpdated": "2024-09-16T22:34:51.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2114 (GCVE-0-2011-2114)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2117, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2117, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2114", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2117, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2114", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-7098 (GCVE-0-2019-7098)
Vulnerability from cvelistv5
Published
2019-05-23 16:47
Modified
2024-08-04 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Memory Corruption
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Adobe | Adobe Shockwave Player |
Version: 12.3.4.204 and earlier versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:38:33.233Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Shockwave Player", "vendor": "Adobe", "versions": [ { "status": "affected", "version": "12.3.4.204\u00a0and earlier versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-23T16:47:08", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2019-7098", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Shockwave Player", "version": { "version_data": [ { "version_value": "12.3.4.204\u00a0and earlier versions" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2019-7098", "datePublished": "2019-05-23T16:47:08", "dateReserved": "2019-01-28T00:00:00", "dateUpdated": "2024-08-04T20:38:33.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2581 (GCVE-0-2010-2581)
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 02:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:39:37.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"pamm\" Chunk Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514559/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12185", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-113/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "1024664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024664" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"pamm\" Chunk Parsing Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514559/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12185", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-113/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-2581", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024664" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "name": "20101029 Secunia Research: Adobe Shockwave Player \"pamm\" Chunk Parsing Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/514559/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:12185", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185" }, { "name": "http://secunia.com/secunia_research/2010-113/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-113/" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-2581", "datePublished": "2010-10-29T18:00:00", "dateReserved": "2010-07-01T00:00:00", "dateUpdated": "2024-08-07T02:39:37.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2030 (GCVE-0-2012-2030)
Vulnerability from cvelistv5
Published
2012-05-09 01:00
Modified
2024-08-06 19:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49086" }, { "name": "shockwave-player-file-code-execution(75459)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T14:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "49086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49086" }, { "name": "shockwave-player-file-code-execution(75459)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459" }, { "name": "1027037", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53420" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-2030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49086" }, { "name": "shockwave-player-file-code-execution(75459)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459" }, { "name": "1027037", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027037" }, { "name": "53420", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53420" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-2030", "datePublished": "2012-05-09T01:00:00", "dateReserved": "2012-04-02T00:00:00", "dateUpdated": "2024-08-06T19:17:27.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2863 (GCVE-0-2010-2863)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11522", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11522", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2863", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11522", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2863", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2870 (GCVE-0-2010-2870)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:11554", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15" }, { "name": "20100824 TPTI-10-15: Adobe Shockwave Director mmap Trusted Chunk Size Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513303/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "oval:org.mitre.oval:def:11554", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15" }, { "name": "20100824 TPTI-10-15: Adobe Shockwave Director mmap Trusted Chunk Size Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513303/100/0/threaded" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2870", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11554", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554" }, { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15" }, { "name": "20100824 TPTI-10-15: Adobe Shockwave Director mmap Trusted Chunk Size Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513303/100/0/threaded" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2870", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-6271 (GCVE-0-2012-6271)
Vulnerability from cvelistv5
Published
2012-12-20 11:00
Modified
2024-08-06 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#519137", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/519137" }, { "name": "VU#323161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/323161" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T19:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#519137", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/519137" }, { "name": "VU#323161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/323161" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-6271", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#519137", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/519137" }, { "name": "VU#323161", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/323161" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-6271", "datePublished": "2012-12-20T11:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T21:28:39.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2449 (GCVE-0-2011-2449)
Vulnerability from cvelistv5
Published
2011-11-08 22:00
Modified
2024-08-06 23:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The TextXtra module in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:34.008Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The TextXtra module in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2449", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TextXtra module in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-27.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "name": "1026288", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026288" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2449", "datePublished": "2011-11-08T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:34.008Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2420 (GCVE-0-2011-2420)
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 23:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.747Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2420", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2420", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.747Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2875 (GCVE-0-2010-2875)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11521", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 Adobe Shockwave Player Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11521", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 Adobe Shockwave Player Memory Corruption Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "oval:org.mitre.oval:def:11521", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "name": "20100824 Adobe Shockwave Player Memory Corruption Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2875", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2126 (GCVE-0-2011-2126)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:16.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "73011", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/73011" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-shockwave-unspec-bo(68050)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68050" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48309", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48309" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "73011", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/73011" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-shockwave-unspec-bo(68050)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68050" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48309", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48309" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2126", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "73011", "refsource": "OSVDB", "url": "http://osvdb.org/73011" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "adobe-shockwave-unspec-bo(68050)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68050" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "name": "48309", "refsource": "BID", "url": "http://www.securityfocus.com/bid/48309" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2126", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:16.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2865 (GCVE-0-2010-2865)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:11725", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "oval:org.mitre.oval:def:11725", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725" }, { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2865", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11725", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725" }, { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2865", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4172 (GCVE-0-2012-4172)
Vulnerability from cvelistv5
Published
2012-10-23 23:00
Modified
2024-08-06 20:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86537", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86537" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124172-bo(79544)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79544" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#872545", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86537", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86537" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124172-bo(79544)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79544" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4172", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#872545", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/872545" }, { "name": "86537", "refsource": "OSVDB", "url": "http://osvdb.org/86537" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-23.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "name": "adobe-cve20124172-bo(79544)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79544" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4172", "datePublished": "2012-10-23T23:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2878 (GCVE-0-2010-2878)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 TPTI-10-10: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513298/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10" }, { "name": "oval:org.mitre.oval:def:11883", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 TPTI-10-10: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513298/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10" }, { "name": "oval:org.mitre.oval:def:11883", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2878", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 TPTI-10-10: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513298/100/0/threaded" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10" }, { "name": "oval:org.mitre.oval:def:11883", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2878", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1383 (GCVE-0-2013-1383)
Vulnerability from cvelistv5
Published
2013-04-10 01:00
Modified
2024-09-16 20:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-10T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1383", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb13-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1383", "datePublished": "2013-04-10T01:00:00Z", "dateReserved": "2013-01-16T00:00:00Z", "dateUpdated": "2024-09-16T20:38:02.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2111 (GCVE-0-2011-2111)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:15.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2111", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:53:15.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0763 (GCVE-0-2012-0763)
Vulnerability from cvelistv5
Published
2012-02-15 01:00
Modified
2024-09-17 00:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-15T01:00:00Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb12-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0763", "datePublished": "2012-02-15T01:00:00Z", "dateReserved": "2012-01-18T00:00:00Z", "dateUpdated": "2024-09-17T00:21:54.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0317 (GCVE-0-2011-0317)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:07.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0317", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0317", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:07.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4093 (GCVE-0-2010-4093)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-07 03:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.033Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46321", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46321" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-17T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "VU#189929", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46321", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46321" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-4093", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#189929", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/189929" }, { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "46321", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46321" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-4093", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2010-10-25T00:00:00", "dateUpdated": "2024-08-07T03:34:37.033Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0318 (GCVE-0-2011-0318)
Vulnerability from cvelistv5
Published
2011-06-16 23:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0318", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb11-17.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "name": "TA11-166A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0318", "datePublished": "2011-06-16T23:00:00", "dateReserved": "2011-01-06T00:00:00", "dateUpdated": "2024-08-06T21:51:08.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-2871 (GCVE-0-2010-2871)
Vulnerability from cvelistv5
Published
2010-08-26 20:00
Modified
2024-08-07 02:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 ZDI-10-160: Adobe Shockwave Player Director File FFFFFF45 Record Processing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/513305/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-160" }, { "name": "oval:org.mitre.oval:def:11970", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "1024361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 ZDI-10-160: Adobe Shockwave Player Director File FFFFFF45 Record Processing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/513305/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-160" }, { "name": "oval:org.mitre.oval:def:11970", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970" }, { "name": "ADV-2010-2176", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2176" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2871", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024361" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-20.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "name": "20100824 ZDI-10-160: Adobe Shockwave Player Director File FFFFFF45 Record Processing Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/513305/100/0/threaded" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-10-160", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-160" }, { "name": "oval:org.mitre.oval:def:11970", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970" }, { "name": "ADV-2010-2176", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2176" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2871", "datePublished": "2010-08-26T20:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3464 (GCVE-0-2009-3464)
Vulnerability from cvelistv5
Published
2009-11-04 15:00
Modified
2024-08-07 06:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an "invalid pointer vulnerability," a different issue than CVE-2009-3465. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36905" }, { "name": "shockwave-pointer-code-execution(54119)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54119" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6394", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3465. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36905" }, { "name": "shockwave-pointer-code-execution(54119)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54119" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6394", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3464", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3465. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36905" }, { "name": "shockwave-pointer-code-execution(54119)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54119" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-16.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:6394", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394" }, { "name": "ADV-2009-3134", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023123" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3464", "datePublished": "2009-11-04T15:00:00", "dateReserved": "2009-09-29T00:00:00", "dateUpdated": "2024-08-07T06:31:10.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3463 (GCVE-0-2009-3463)
Vulnerability from cvelistv5
Published
2009-11-04 15:00
Modified
2024-08-07 06:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.349Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "shockwave-index-code-execution(54118)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54118" }, { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:5677", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "shockwave-index-code-execution(54118)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54118" }, { "name": "36905", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36905" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:5677", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677" }, { "name": "ADV-2009-3134", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3463", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "shockwave-index-code-execution(54118)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54118" }, { "name": "36905", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36905" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-16.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "name": "oval:org.mitre.oval:def:5677", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677" }, { "name": "ADV-2009-3134", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "name": "1023123", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023123" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3463", "datePublished": "2009-11-04T15:00:00", "dateReserved": "2009-09-29T00:00:00", "dateUpdated": "2024-08-07T06:31:10.349Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0569 (GCVE-0-2011-0569)
Vulnerability from cvelistv5
Published
2011-02-10 15:00
Modified
2024-08-06 21:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110209 TPTI-11-05: Adobe Shockwave PFR1 Font Chunk Parsing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516335/100/0/threaded" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025056" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05" }, { "name": "adobe-fontxtra-code-execution(65260)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65260" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "ADV-2011-0335", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110209 TPTI-11-05: Adobe Shockwave PFR1 Font Chunk Parsing Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516335/100/0/threaded" }, { "name": "1025056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025056" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05" }, { "name": "adobe-fontxtra-code-execution(65260)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65260" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-0569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0335", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "name": "20110209 TPTI-11-05: Adobe Shockwave PFR1 Font Chunk Parsing Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/516335/100/0/threaded" }, { "name": "1025056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025056" }, { "name": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05", "refsource": "MISC", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05" }, { "name": "adobe-fontxtra-code-execution(65260)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65260" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-0569", "datePublished": "2011-02-10T15:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1282 (GCVE-0-2010-1282)
Vulnerability from cvelistv5
Published
2010-05-13 17:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "40088", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40088" }, { "name": "20100512 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7388", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" }, { "name": "20100511 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "40088", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40088" }, { "name": "20100512 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7388", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" }, { "name": "20100511 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "tags": [ "x_refsource_MISC" ], "url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1282", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "40088", "refsource": "BID", "url": "http://www.securityfocus.com/bid/40088" }, { "name": "20100512 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:7388", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" }, { "name": "20100511 [CAL-20100204-1]Adobe Shockwave Player Director File Parsing ATOM size infinite loop vulnerability", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html", "refsource": "MISC", "url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1282", "datePublished": "2010-05-13T17:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2422 (GCVE-0-2011-2422)
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 23:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Textra.x32 in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.881Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Textra.x32 in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-05T09:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "TA11-222A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2011-2422", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Textra.x32 in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA11-222A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb11-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2011-2422", "datePublished": "2011-08-11T22:00:00", "dateReserved": "2011-06-06T00:00:00", "dateUpdated": "2024-08-06T23:00:33.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1290 (GCVE-0-2010-1290)
Vulnerability from cvelistv5
Published
2010-05-13 21:00
Modified
2024-08-07 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7154", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "38751", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7154", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1290", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38751", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38751" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-12.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "name": "ADV-2010-1128", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "name": "oval:org.mitre.oval:def:7154", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1290", "datePublished": "2010-05-13T21:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.8.612 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-2863", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-26T21:00:01.607", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11522" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/511242/100/0/threaded | Third Party Advisory, VDB Entry | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.zerodayinitiative.com/advisories/ZDI-10-089/ | Third Party Advisory, VDB Entry | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511242/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-10-089/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." }, { "lang": "es", "value": "La validaci\u00f3n de los paquetes de pami RIFF en Adobe Shockwave Player anterior a v11.5.7.609 no valida un valor determinado desde un fichero antes de realizar los c\u00e1lculos del puntero al fichero, el cu\u00e1l permite a atacantes remotos ejecutar c\u00f3digo a su elecci\u00f3n o causar una denegaci\u00f3n del servicio (corrupci\u00f3n de memoria) a trav\u00e9s de la manipulaci\u00f3n del fichero .dir (conocido como Director)" } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\n\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1292", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T17:30:02.157", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511242/100/0/threaded" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511242/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-089/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-10 03:48
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1386.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "04161DD0-126A-443E-96F5-6038B6F5249B", "versionEndIncluding": "12.0.0.112", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1386." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v12.0.2.122 permite a atacantes ejecutar c\u00f3digo arbitrario o causar denegaci\u00f3n de servicios (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2013-1386." } ], "id": "CVE-2013-1384", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-10T03:48:20.447", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/46317 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46317 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un fragmento malformado en un archivo Director, una vulnerabilidad diferente a la CVE-2011-0555, CVE-2010-4093, CVE- 2010-4190, CVE-2010-4191, CVE-2010-4192 y CVE-2010-4306." } ], "id": "CVE-2010-4187", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.800", "references": [ { "source": "psirt@adobe.com", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46317" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-14 23:59
Modified
2025-04-12 10:46
Severity ?
Summary
Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5120.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.securitytracker.com/id/1032891 | Third Party Advisory, VDB Entry | |
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb15-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032891 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb15-17.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "40FC1082-6D2C-42F7-8C85-E28F7DBE2333", "versionEndIncluding": "12.1.8.158", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5120." }, { "lang": "es", "value": "Versiones de Adobe Shockwave Player anteriores a 12.1.9.159 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicios mediante la corrupci\u00f3n de memoria a trav\u00e9s de vectores no especificados, vulnerabilidad diferente de CVE-2015-5120" } ], "id": "CVE-2015-5121", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-14T23:59:04.097", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032891" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-21 19:30
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/37888 | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2009-61/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://securitytracker.com/id?1023481 | ||
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb10-03.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/509062/100/0/threaded | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/37870 | ||
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2010/0171 | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/55758 | ||
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37888 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2009-61/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1023481 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-03.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/509062/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/37870 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0171 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/55758 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "B86E4A33-61AB-4415-AE62-2CDB2A677335", "versionEndIncluding": "11.5.2.602", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap) en Adobe Shockwave Player anterior a v11.5.6.606, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un modelo manipulado en 3D en un archivo Shockwave" } ], "id": "CVE-2009-4002", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-01-21T19:30:00.773", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37888" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-61/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securitytracker.com/id?1023481" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/509062/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/37870" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55758" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-61/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/509062/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37870" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, and CVE-2011-2128.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/73019 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/48294 | ||
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/68048 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/73019 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48294 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/68048 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, and CVE-2011-2128." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.0.626 permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Vulnerabilidad distinta de CVE-2011-2114, CVE-2011-2117, CVE-2011-2127, y CVE-2011-2128." } ], "id": "CVE-2011-2124", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.620", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73019" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48294" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48294" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68048" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513329/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513329/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player anterior a v11.5.8.612, no valida adecuadamente los archivos .dir, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica -heap-) o la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo mal formado con un valor no v\u00e1lido, como se ha demostrado con un valor determinado en la posici\u00f3n 0x3712 de un archivo." } ], "id": "CVE-2010-2869", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.887", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513329/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513329/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11983" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/86537 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/872545 | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/79544 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/86537 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/872545 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/79544 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, y CVE-2012-5273." } ], "id": "CVE-2012-4172", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.457", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86537" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79544" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/38751 | Not Applicable | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-50/ | Not Applicable | |
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/511265/100/0/threaded | Third Party Advisory, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/40093 | Third Party Advisory, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required | |
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-50/ | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511265/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/40093 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via crafted embedded fonts in a Shockwave file." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante fuentes manipuladas embebidas en un fichero Shockwave." } ], "id": "CVE-2010-0987", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:01.953", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-50/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511265/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40093" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-50/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511265/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7052" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 does not properly process asset entries, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted Shockwave file.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/38751 | Not Applicable | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-34/ | Not Applicable | |
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/511264/100/0/threaded | Third Party Advisory, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/40086 | Broken Link, Third Party Advisory, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required | |
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-34/ | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511264/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/40086 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly process asset entries, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted Shockwave file." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 no procesa adecuadamente las entradas de activos, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero Shockwave manipulado." } ], "id": "CVE-2010-0986", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:01.920", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-34/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511264/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40086" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-34/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511264/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6967" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante un archivo multimedia .dir manipulado." } ], "id": "CVE-2011-2421", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-08-11T22:55:01.583", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-03-14 10:55
Modified
2025-04-12 10:46
Severity ?
Summary
Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 | |
adobe | shockwave_player | 12.0.3.133 | |
adobe | shockwave_player | 12.0.4.144 | |
adobe | shockwave_player | 12.0.6.147 | |
adobe | shockwave_player | 12.0.7.148 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2367BAB-E085-46F7-B8DE-CF3B3656BAB5", "versionEndIncluding": "12.0.9.149", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.6.147:*:*:*:*:*:*:*", "matchCriteriaId": "FC110854-7ACE-44E5-B73A-8A1EBD2AD84A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.7.148:*:*:*:*:*:*:*", "matchCriteriaId": "4F284BF7-8E14-4608-B515-2B5D4F55BA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.0.150 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a 12.1.0.150 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2014-0505", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-14T10:55:05.600", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-10.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-09-09 00:59
Modified
2025-04-12 10:46
Severity ?
Summary
Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.securitytracker.com/id/1033486 | ||
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb15-22.html | Patch, Vendor Advisory | |
psirt@adobe.com | https://security.gentoo.org/glsa/201509-07 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033486 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb15-22.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201509-07 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E66A61F-593B-4496-B19A-100215C0648E", "versionEndIncluding": "12.1.9.160", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680." }, { "lang": "es", "value": "Vulnerabilidad en Adobe Shockwave Player en versiones anteriores a 12.2.0.162, permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2015-6680." } ], "id": "CVE-2015-6681", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-09-09T00:59:55.363", "references": [ { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1033486" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201509-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201509-07" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie." }, { "lang": "es", "value": "Error en entero de signo en Adobe Shockwave Player anterior a v11.5.8.612 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo arbitrario mediante un valor de longitud asociados con el trozo TSAC en una pel\u00edcula Director." } ], "id": "CVE-2010-2875", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.153", "references": [ { "source": "psirt@adobe.com", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11521" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n exitosa conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7103", "lastModified": "2024-11-21T04:47:34.190", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.550", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/73034 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/73034 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de entero en Adobe Shockwave Player anterior a 11.6.0.626, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2121", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.510", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73034" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-5273.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/86540 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/872545 | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/79547 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/86540 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/872545 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/79547 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-5273." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, y CVE-2012-5273." } ], "id": "CVE-2012-4175", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.580", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86540" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79547" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00faffer en memoria din\u00e1mica en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2012-0758", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:01.980", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-10-12 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513300/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-10-12 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513300/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the allocator in the TextXtra.x32 module in Adobe Shockwave Player before 11.5.8.612 allow remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted (1) element count or (2) element size value in a file." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de entero en el asignador del m\u00f3dulo TextXtra.x32 de Adobe Shockwave Player anterior a v11.5.8.612 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n en la pila de memoria) o ejecutar c\u00f3digo de su elecci\u00f3n mediante (1) elemento count -contar- o (2) elemento size value -valor de tama\u00f1o- manipulados en un fichero." } ], "id": "CVE-2010-2879", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.310", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513300/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11998" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/73015 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/48308 | ||
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/68049 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/73015 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48308 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/68049 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Dirapix.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "B\u00fafer overflow Dirapix.dll en Adobe Shockwave Player en versiones anteriores a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2125", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.650", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73015" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48308" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68049" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-09-09 00:59
Modified
2025-04-12 10:46
Severity ?
Summary
Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.securitytracker.com/id/1033486 | ||
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb15-22.html | Patch, Vendor Advisory | |
psirt@adobe.com | https://security.gentoo.org/glsa/201509-07 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033486 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb15-22.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201509-07 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E66A61F-593B-4496-B19A-100215C0648E", "versionEndIncluding": "12.1.9.160", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681." }, { "lang": "es", "value": "Vulnerabilidad en Adobe Shockwave Player en versiones anteriores a 12.2.0.162, permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2015-6681." } ], "id": "CVE-2015-6680", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-09-09T00:59:54.160", "references": [ { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1033486" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "source": "psirt@adobe.com", "url": "https://security.gentoo.org/glsa/201509-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201509-07" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-08 23:17
Modified
2025-04-09 00:30
Severity ?
Summary
The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://crypto.stanford.edu/dns/dns-rebinding.pdf | ||
cve@mitre.org | http://lists.apple.com/archives/security-announce/2008//May/msg00001.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html | ||
cve@mitre.org | http://secunia.com/advisories/28157 | ||
cve@mitre.org | http://secunia.com/advisories/28161 | ||
cve@mitre.org | http://secunia.com/advisories/28213 | ||
cve@mitre.org | http://secunia.com/advisories/28570 | ||
cve@mitre.org | http://secunia.com/advisories/29763 | ||
cve@mitre.org | http://secunia.com/advisories/29865 | ||
cve@mitre.org | http://secunia.com/advisories/30430 | ||
cve@mitre.org | http://secunia.com/advisories/30507 | ||
cve@mitre.org | http://securitytracker.com/id?1019116 | ||
cve@mitre.org | http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1 | ||
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb07-20.html | ||
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb08-11.html | ||
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml | ||
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-1126.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0221.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/26930 | ||
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA07-355A.html | US Government Resource | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA08-100A.html | US Government Resource | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA08-150A.html | US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/4258 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2008/1697 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2008/1724/references | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://crypto.stanford.edu/dns/dns-rebinding.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2008//May/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28157 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28161 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28213 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28570 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29763 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29865 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30430 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30507 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1019116 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb07-20.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb08-11.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-1126.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0221.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26930 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA07-355A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-100A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-150A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/4258 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1697 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1724/references | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | 9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser\u0027s DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324." }, { "lang": "es", "value": "La extensi\u00f3n Adobe Macromedia Flash 9 permite a atacantes remotos provocar que la m\u00e1quina de una v\u00edctima establezca sesiones TCP con anfitriones arbitrarios mediante una pel\u00edcula Flash (SWF), relacionada con la falta de fijaci\u00f3n de un nombre de anfitri\u00f3n con una direcci\u00f3n IP \u00fanica despu\u00e9s de recibir un elemento permitir-acceso-desde (allow-access-from) en un documento XML de pol\u00edtica-de-dominio-cruzado (cross-domain-policy), y la disponibilidad de una clase Socket Flash que no utiliza las fijaciones DNS del navegador, tambi\u00e9n conocidos como ataques de revinculaci\u00f3n DNS, un problema diferente de CVE-2002-1467 Y CVE-2007-4324." } ], "id": "CVE-2007-5275", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-08T23:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://crypto.stanford.edu/dns/dns-rebinding.pdf" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28157" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28161" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28213" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28570" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29763" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29865" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30430" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30507" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1019116" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "source": "cve@mitre.org", "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html" }, { "source": "cve@mitre.org", "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26930" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/4258" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1724/references" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://crypto.stanford.edu/dns/dns-rebinding.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1019116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/4258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1724/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513333/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513333/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player anterior a v11.5.8.612 no parsea adecuadamente archivos .dir, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posibilita ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de archivos mal formados que contienen un valor no v\u00e1lido, como se demostr\u00f3 con el valor de la posici\u00f3n 0x320D de ciertos archivos." } ], "id": "CVE-2010-2868", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.857", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513333/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513333/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11540" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.6.4.634 permite que los atacantes ejecuten c\u00f3digo arbitrario o provoquen una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante vectores no especificados. Esta es una vulnerabilidad diferente de CVE-2012-0771." } ], "id": "CVE-2012-0759", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.040", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/79245 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/79245 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0764." } ], "id": "CVE-2012-0766", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.447", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/79245" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/79245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple buffer overflows in the Shockwave3DAsset component in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the Shockwave3DAsset component in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en el componente Shockwave3DAsset en Adobe Shockwave Player anterior a v11.6.0.626, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2113", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.230", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/189929 | US Government Resource | |
psirt@adobe.com | http://www.securityfocus.com/bid/46334 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/189929 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46334 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a va11.5.9.620 no valida correctamente la entrada de datos no especificados, que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2010-4193", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.083", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46334" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the CursorAsset x32 component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de enteros en el componente CursorAsset x32 de Adobe Shockwave Player en versiones anteriores a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2120", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.480", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/40091 | Third Party Advisory, VDB Entry | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/40091 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1284", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.390", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40091" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6638" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-21 19:30
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/37888 | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2009-62/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2009-63/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-1/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://securitytracker.com/id?1023481 | ||
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb10-03.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/509053/100/0/threaded | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/509055/100/0/threaded | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/509058/100/0/threaded | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/37872 | ||
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2010/0171 | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/55759 | ||
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37888 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2009-62/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2009-63/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-1/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1023481 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-03.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/509053/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/509055/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/509058/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/37872 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0171 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/55759 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "B86E4A33-61AB-4415-AE62-2CDB2A677335", "versionEndIncluding": "11.5.2.602", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption." }, { "lang": "es", "value": "M\u00faltiples desbordamiento de b\u00fafer basados en entero en Adobe Shockwave Player en versiones anteriores a la 11.5.6.606 permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante (1) un tipo de bloque no especificado en un fichero Shockwave, que genera un desbordamiento de b\u00fafer basado en pila; y pueden permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante (2) un bloque 3D no especificado en un fichero Shockwave que genera una corrupci\u00f3n de memoria; o (3) un modelo 3D manipulado en un fichero Shockwave que genera una corrupci\u00f3n de la pila." } ], "id": "CVE-2009-4003", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-01-21T19:30:00.820", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37888" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-62/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-63/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-1/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securitytracker.com/id?1023481" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/509053/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/509055/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/509058/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/37872" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55759" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-62/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2009-63/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-03.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/509053/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/509055/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/509058/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513334/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513334/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C6 of a certain file." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player anterior a v11.5.8.612 no parsea adecuadamente archivos .dir, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de archivos mal formados que contienen un valor no v\u00e1lido, como se demostr\u00f3 con el valor de la posici\u00f3n 0x24C6 de ciertos archivos." } ], "id": "CVE-2010-2864", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.653", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513334/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11913" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-12-20 12:02
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.kb.cert.org/vuls/id/323161 | ||
cret@cert.org | http://www.kb.cert.org/vuls/id/519137 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/323161 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/519137 | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F907CF9F-BDEC-46D4-A6C4-B345A8003732", "versionEndIncluding": "11.6.8.638", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of arbitrary signed Xtras via a Shockwave movie that contains an Xtra URL, as demonstrated by a URL for an outdated Xtra." }, { "lang": "es", "value": "Adobe Shockwave Player hasta v11.6.8.638 permite a atacantes remotos provocar la instalaci\u00f3n de Xtras firmadas a trav\u00e9s de una pel\u00edcula Shockwave que contiene una direcci\u00f3n URL Xtra, como lo demuestra una URL para un Xtra anticuado." } ], "id": "CVE-2012-6271", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-12-20T12:02:20.013", "references": [ { "source": "cret@cert.org", "url": "http://www.kb.cert.org/vuls/id/323161" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/519137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kb.cert.org/vuls/id/323161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/519137" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-11-08 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2446.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-27.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1026288 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-27.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026288 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CF0DAD5-B014-41C6-B3F4-B4770DEE2940", "versionEndIncluding": "11.6.1.629", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2446." }, { "lang": "es", "value": "El librer\u00eda DIRapi en Adobe Sockwave Player antes de v11.6.3.633 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2011-2446" } ], "id": "CVE-2011-2448", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-08T22:55:01.113", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1026288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026288" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-04 15:30
Modified
2025-04-09 00:30
Severity ?
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an "invalid string length vulnerability." NOTE: some of these details are obtained from third party information.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://securitytracker.com/id?1023123 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb09-16.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/36905 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2009/3134 | Vendor Advisory | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/54121 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1023123 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb09-16.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/36905 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3134 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/54121 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2616516-18CA-4F56-803F-8CD3DBC56006", "versionEndIncluding": "11.5.1.601", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an \"invalid string length vulnerability.\" NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.2.602, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una p\u00e1gina web manipulada que provoca una corrupci\u00f3n de memoria. Relacionado con la \"vulnerabilidad de longitud de cadena inv\u00e1lida\". NOTA: algunos de estos detalles han sido obtenidos a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-3466", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-04T15:30:00.627", "references": [ { "source": "psirt@adobe.com", "url": "http://securitytracker.com/id?1023123" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54121" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 does not properly parse 3D objects in .dir (aka Director) files, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a modified field in a 0xFFFFFF49 record.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Third Party Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/511253/100/0/threaded | Third Party Advisory, VDB Entry | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required, Third Party Advisory | |
psirt@adobe.com | http://www.zerodayinitiative.com/advisories/ZDI-10-088/ | Third Party Advisory, VDB Entry | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262 | Third Party Advisory, Tool Signature | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511253/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-10-088/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262 | Third Party Advisory, Tool Signature |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 does not properly parse 3D objects in .dir (aka Director) files, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a modified field in a 0xFFFFFF49 record." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.7.609 no parsea adcuadamente objetos 3D en ficheros .dir (conocido como Director), los cuales permiten a atacantes remotos ejecutar c\u00f3digo aleatorio o causar una denegaci\u00f3n del servicio (corrupci\u00f3n de la memoria din\u00e1mica -heap-) a trav\u00e9s de la modificaci\u00f3n de un campo del registro 0xFFFFFF49." } ], "id": "CVE-2010-1283", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:02.127", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511253/100/0/threaded" }, { "source": "psirt@adobe.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511253/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-088/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7262" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n con \u00e9xito conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7099", "lastModified": "2024-11-21T04:47:33.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.360", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-10-15 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513303/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-10-15 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513303/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." }, { "lang": "es", "value": "DIRAPIX.dll en Adobe Shockwave Player anterior a v11.5.8.612 no valida de forma adecuada el tama\u00f1o de determinado fragmento en el fragmento nmap de una pel\u00edcula de Director, esto permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n en la pila de memoria) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una pel\u00edcula manipulada." } ], "id": "CVE-2010-2870", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.937", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513303/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513303/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11554" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-11-04 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/516334/100/0/threaded | ||
psirt@adobe.com | http://www.securityfocus.com/bid/46320 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-11-04 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516334/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46320 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset." }, { "lang": "es", "value": "El m\u00f3dulo IML32 de Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una pel\u00edcula Director que contiene una imagen GIF con un valor de tama\u00f1o de la tabla de colores global especialmente dise\u00f1ado, que causa un desplazamiento de puntero fuera de rango." } ], "id": "CVE-2010-4189", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.910", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516334/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46320" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516334/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-14 23:59
Modified
2025-04-12 10:46
Severity ?
Summary
Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5121.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.securitytracker.com/id/1032891 | Third Party Advisory, VDB Entry | |
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb15-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032891 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb15-17.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "40FC1082-6D2C-42F7-8C85-E28F7DBE2333", "versionEndIncluding": "12.1.8.158", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.1.9.159 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5121." }, { "lang": "es", "value": "versiones de Adobe Shockwave Player anteriores a la versi\u00f3n 12.1.9.159 permiten a atacantes la ejecuci\u00f3n de c\u00f3digo arbitrario o provocar denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante el uso de vectores no especificados, una vulnerabilidad distinta a CVE-2015-5121." } ], "id": "CVE-2015-5120", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-14T23:59:02.753", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032891" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-15 10:31
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28CEA80-DD20-47B7-92B1-4ABA569EB5C6", "versionEndIncluding": "11.6.5.635", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2046." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.6.636 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente a CVE-2012-2043, CVE-2012-2044, CVE-2012-2045 y CVE-2012-2046.\r\n" } ], "id": "CVE-2012-2047", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-15T10:31:40.913", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/46339 | ||
cve@mitre.org | http://www.securitytracker.com/id?1025056 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46339 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player v11.5.9.620, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-4307", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.347", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/46339" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/86538 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/872545 | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/79545 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/86538 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/872545 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/79545 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, y CVE-2012-5273." } ], "id": "CVE-2012-4173", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.487", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86538" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79545" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.5.7.609 might allow attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 podr\u00eda permitir a atacantes ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1288", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.593", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7543" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513328/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513328/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x24C0 of a certain file." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player anterior a v11.5.8.612 no valida adecuadamente los archivos .dir, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo mal formado que contiene un valor no v\u00e1lido , como se ha demostrado con un valor en la posici\u00f3n 0x24C0 de un archivo determinado." } ], "id": "CVE-2010-2881", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.387", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513328/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513328/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11614" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player anterior a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente de CVE-2011-2115 y CVE-2011-2116.\r\n" } ], "id": "CVE-2011-2111", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.150", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/79242 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/52002 | ||
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/73175 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/79242 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/52002 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/73175 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "id": "CVE-2012-0762", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.260", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/79242" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/52002" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/79242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73175" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file containing "duplicated LCSM entries in mmap record," a different vulnerability than CVE-2010-4087.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/514582/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024664 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514582/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024664 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file containing \"duplicated LCSM entries in mmap record,\" a different vulnerability than CVE-2010-4087." }, { "lang": "es", "value": "La biblioteca IML32.dll en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo .dir que contiene \"duplicated LCSM entries in mmap record\", una vulnerabilidad diferente de CVE-2010-4087." } ], "id": "CVE-2010-4089", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.467", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/514582/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514582/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11748" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an "undocumented structure" and the tSAC chunk in a Director movie.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-10-13 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513301/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-10-13 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513301/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an \"undocumented structure\" and the tSAC chunk in a Director movie." }, { "lang": "es", "value": "Error de signo en entero en el m\u00f3dulo DIRAPI en Adobe Shockwave Player anterior a v11.5.8.612, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un valor \"count\" asociado a una \"estructura no documentada\" y un trozo de tSAC en una pel\u00edcula Director." } ], "id": "CVE-2010-2866", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.780", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513301/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513301/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple buffer overflows in IML32.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in IML32.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en IML32.dll de Adobe Shockwave Player con anterioridad a v11.6.0.626, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) o ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados.\r\n" } ], "id": "CVE-2011-2112", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.183", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a "pointer offset vulnerability."
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-10-14 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513299/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-10-14 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513299/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a \"pointer offset vulnerability.\"" }, { "lang": "es", "value": "DIRAPIX.dll en Adobe Shockwave Player anterior a v11.5.8.612 no maneja correctamente un determinado valor de retorno asociado con el fragmento rcsl en una pel\u00edcula Director, el cual puede permitir a un atacante remoto generar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria en el mont\u00f3n) o ejecutar c\u00f3digo arbitrario mediante una pel\u00edcula manipulada, relacionado con \"vulnerabilidad de puntero de desplazamiento.\"" } ], "id": "CVE-2010-2867", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:01.810", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513299/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12021" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-12 13:28
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-23.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-23.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D33992BA-E5D9-4134-AABC-0E7EEE6B619A", "versionEndIncluding": "12.0.3.133", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359." }, { "lang": "es", "value": "Adobe Shockwave Player anteriores a 12.0.4.144 permite a atacantes ejecutar c\u00f3digo arbitrario o causar denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2013-3359." } ], "id": "CVE-2013-3360", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-12T13:28:24.563", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll de Adobe Shockwave Player en versiones anteriores a 11.6.0.626 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una enegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad distinta a CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119 y CVE-2011-2122." } ], "id": "CVE-2011-0317", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:01.230", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1290." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1291", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.703", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7183" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/46329 | ||
PSIRT-CNA@flexerasoftware.com | http://www.securitytracker.com/id?1025056 | ||
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/65245 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46329 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/65245 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de enteros en el m\u00f3dulo dirapi.dll en Adobe Shockwave Player anterior a v11.5.9.620 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-2589", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.537", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/46329" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65245" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player antes de v11.6.0.626 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria ) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE -2011- 0317, CVE -2011- 0318, CVE -2011- 0319, CVE -2011- 0320, CVE -2011- 2119, CVE- 2011 y 2122." } ], "id": "CVE-2011-0335", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:01.400", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file, related to (1) an erroneous dereference and (2) a certain Shock.dir file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html | Broken Link | |
psirt@adobe.com | http://secunia.com/advisories/38751 | Broken Link, Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/511257/100/0/threaded | Broken Link, VDB Entry | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Broken Link, Vendor Advisory | |
psirt@adobe.com | http://www.zeroscience.mk/codes/shockwave_mem.txt | Exploit, Third Party Advisory | |
psirt@adobe.com | http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php | Exploit, Third Party Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184 | Tool Signature | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511257/100/0/threaded | Broken Link, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zeroscience.mk/codes/shockwave_mem.txt | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184 | Tool Signature |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file, related to (1) an erroneous dereference and (2) a certain Shock.dir file." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante un fichero .dir (tambi\u00e9n conocido como Director) manipulado, relacionado con (1) una dereferencia err\u00f3nea y (2) un cierto fichero Shock.dir." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1280", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:02.000", "references": [ { "source": "psirt@adobe.com", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511257/100/0/threaded" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.zeroscience.mk/codes/shockwave_mem.txt" }, { "source": "psirt@adobe.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php" }, { "source": "psirt@adobe.com", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511257/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.zeroscience.mk/codes/shockwave_mem.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7184" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/516322/100/0/threaded | ||
psirt@adobe.com | http://www.securityfocus.com/bid/46326 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
psirt@adobe.com | http://www.zerodayinitiative.com/advisories/ZDI-11-078 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516322/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46326 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-11-078 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306." }, { "lang": "es", "value": "Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una pel\u00edcula Director con un registro de tipo 0xFFFFFF88 de activos 3D especialmente dise\u00f1ados que desencadenan una asignaci\u00f3n de memoria incorrecta, una vulnerabilidad diferente de CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191 y CVE-2010-4306." } ], "id": "CVE-2010-4192", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.037", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516322/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46326" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516322/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-078" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows attackers to cause a denial of service via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Adobe Shockwave Player anterior a v11.5.8.612 permite a los atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de vectores desconocidos" } ], "id": "CVE-2010-2865", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-26T21:00:01.700", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11725" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-04 15:30
Modified
2025-04-09 00:30
Severity ?
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an "invalid pointer vulnerability," a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://securitytracker.com/id?1023123 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb09-16.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/36905 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2009/3134 | Patch, Vendor Advisory | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/54120 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1023123 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb09-16.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/36905 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3134 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/54120 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2616516-18CA-4F56-803F-8CD3DBC56006", "versionEndIncluding": "11.5.1.601", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Adobe Shockwave Player anerior a v11.5.2.602, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s un contenido Shockwave manipulado en una p\u00e1gina web. Relacionado con la \"vulnerabilidad de puntero inv\u00e1lido. Cuesti\u00f3n distinta de CVE-2009-3464. NOTA: algunos de estos detalles han sido obtenidos a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-3465", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-04T15:30:00.593", "references": [ { "source": "psirt@adobe.com", "url": "http://securitytracker.com/id?1023123" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54120" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5722" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/79244 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/52004 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/79244 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/52004 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, and CVE-2012-0766." } ], "id": "CVE-2012-0764", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.370", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/79244" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/52004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/79244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52004" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4175, and CVE-2012-5273.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/86539 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/872545 | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/79546 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/86539 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/872545 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/79546 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4175, and CVE-2012-5273." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, y CVE-2012-5273." } ], "id": "CVE-2012-4174", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.537", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86539" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86539" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79546" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with a crafted mmap record containing an invalid length of a VSWV entry, a different vulnerability than CVE-2010-4089.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/514581/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024664 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514581/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024664 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with a crafted mmap record containing an invalid length of a VSWV entry, a different vulnerability than CVE-2010-4089." }, { "lang": "es", "value": "La biblioteca IML32.dll en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo .dir con un registro mmap especialmente dise\u00f1ado que contiene una longitud no v\u00e1lida de una entrada VSWV, una vulnerabilidad diferente de CVE-2010-4089." } ], "id": "CVE-2010-4087", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.403", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/514581/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514581/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12093" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with "duplicated references to the same KEY* chunk," a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/514580/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024664 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514580/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024664 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with \"duplicated references to the same KEY* chunk,\" a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086." }, { "lang": "es", "value": "La biblioteca dirapi.dll en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo .dir con \"duplicated references to the same KEY* chunk\", una vulnerabilidad diferente de CVE-2010-2581, CVE-2010-4084, CVE-2010-4085 y CVE-2010-4086." } ], "id": "CVE-2010-4088", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.433", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1289, and CVE-2010-1291." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1290", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.670", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7154" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-02-13 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-06.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA13-043A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-06.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA13-043A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F907CF9F-BDEC-46D4-A6C4-B345A8003732", "versionEndIncluding": "11.6.8.638", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en la pila en Adobe Shockwave Player hasta v12.0.0.112 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-0636", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-13T21:55:06.760", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n exitosa conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7102", "lastModified": "2024-11-21T04:47:34.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.503", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-04 15:30
Modified
2025-04-09 00:30
Severity ?
Summary
Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://securitytracker.com/id?1023123 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb09-16.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/36905 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2009/3134 | Vendor Advisory | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/54118 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1023123 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb09-16.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/36905 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3134 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/54118 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2616516-18CA-4F56-803F-8CD3DBC56006", "versionEndIncluding": "11.5.1.601", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Array index error in Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Error de indexaci\u00f3n de array en Adobe Shockwave Player anterior a v11.5.2.602, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un contenido Shockwave manipulado en un sitios web. NOTA: algunos de estos detalles han sido obtenidos a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-3463", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-04T15:30:00.500", "references": [ { "source": "psirt@adobe.com", "url": "http://securitytracker.com/id?1023123" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54118" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5677" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-114/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/514560/100/0/threaded | ||
PSIRT-CNA@flexerasoftware.com | http://www.securitytracker.com/id?1024664 | ||
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-114/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514560/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024664 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code." }, { "lang": "es", "value": "Una funci\u00f3n no especificada en TextXtra.x32 en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, no reasigna apropiadamente un b\u00fafer al procesar un fragmento DEMX en un archivo Director, lo que permite a los atacantes remotos activar un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria y ejecutar c\u00f3digo arbitrario." } ], "id": "CVE-2010-2582", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:01.590", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-114/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/514560/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-114/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514560/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12078" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2117, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2117, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente de CVE-2011-2117, CVE-2011-2124, CVE-2011-2127 y CVE-2011-2128." } ], "id": "CVE-2011-2114", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.260", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/189929 | US Government Resource | |
psirt@adobe.com | http://www.securityfocus.com/bid/46321 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/189929 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46321 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.9.620 permite a atacantes a ejecutar c\u00f3digo o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no espec\u00edficos, vulnerabilidad diferente a CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, y CVE-2010-4306." } ], "id": "CVE-2010-4093", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.707", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46321" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-11-02 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/516333/100/0/threaded | ||
psirt@adobe.com | http://www.securityfocus.com/bid/46327 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/65257 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-11-02 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516333/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46327 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/65257 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." }, { "lang": "es", "value": "El m\u00f3dulo TextXtra.x32 de Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria de la pila) por medio de un archivo Director con un fragmento DEMX RIFF dise\u00f1ado que desencadena una asignaci\u00f3n incorrecta del b\u00fafer, una vulnerabilidad diferente de CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192 y CVE-2010-4306." } ], "id": "CVE-2011-0555", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:32.270", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516333/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46327" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516333/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65257" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-11-08 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-27.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1026288 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-27.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026288 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CF0DAD5-B014-41C6-B3F4-B4770DEE2940", "versionEndIncluding": "11.6.1.629", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DIRapi library in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2448." }, { "lang": "es", "value": "La librer\u00eda DIRapi en Adobe Sockwave Player antes de v11.6.3.633 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2011-2448." } ], "id": "CVE-2011-2446", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-08T22:55:01.037", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1026288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026288" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1024664 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024664 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.9.615 permite a los atacantes ejecutar c\u00f3digo a su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-4090", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.497", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/86542 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/872545 | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/79548 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/86542 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/872545 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/79548 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Error de \u00edndice de matriz en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2012-4176", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.627", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86542" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86542" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/872545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79548" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-14 01:46
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/26388 | Exploit | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/38359 | ||
cve@mitre.org | https://www.exploit-db.com/exploits/4613 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26388 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/38359 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/4613 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el control ActiveX SWCtl.SWCtl en Adobe Shockwave permite a atacantes remotos provocar denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un argumento largo en el m\u00e9todo ShockwaveVersion." } ], "id": "CVE-2007-5941", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-14T01:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/26388" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38359" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/4613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/26388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38359" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/4613" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-15 10:31
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28CEA80-DD20-47B7-92B1-4ABA569EB5C6", "versionEndIncluding": "11.6.5.635", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.6.636 permite a atacantes ejecutar c\u00f3digo arbitrario y causar una denegaci\u00f3n de servicio mediante vectores no especificados, una vulnerabilidad diferente a CVE-2012-2043, CVE-2012-2045, CVE-2012-2046, y CVE-2012-2047." } ], "id": "CVE-2012-2044", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-15T10:31:40.757", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-12 04:50
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://helpx.adobe.com/security/products/shockwave/apsb14-06.html | Vendor Advisory | |
psirt@adobe.com | http://osvdb.org/103157 | ||
psirt@adobe.com | http://secunia.com/advisories/56740 | ||
psirt@adobe.com | http://www.securityfocus.com/bid/65490 | ||
psirt@adobe.com | http://www.securitytracker.com/id/1029740 | ||
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/91007 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://helpx.adobe.com/security/products/shockwave/apsb14-06.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/103157 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/56740 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/65490 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1029740 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/91007 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 | |
adobe | shockwave_player | 12.0.3.133 | |
adobe | shockwave_player | 12.0.4.144 | |
adobe | shockwave_player | 12.0.6.147 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C4B100C-6C43-4BEF-AD9C-680C7764A41E", "versionEndIncluding": "12.0.7.148", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.6.147:*:*:*:*:*:*:*", "matchCriteriaId": "FC110854-7ACE-44E5-B73A-8A1EBD2AD84A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a 12.0.9.149 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0501." } ], "id": "CVE-2014-0500", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-12T04:50:41.313", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/103157" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/56740" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/65490" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1029740" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/103157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513306/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | http://www.zerodayinitiative.com/advisories/ZDI-10-161 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513306/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-10-161 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate an offset value in the pami RIFF chunk in a Director movie, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted movie." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.8.612 no valida correctamente un valor de desplazamiento en el fragmento pami RIFF en una pel\u00edcula Director, el cual puede permitir a atacantes remotos producir una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo arbitrario mediante una pel\u00edcula manipulada" } ], "id": "CVE-2010-2872", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.060", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513306/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11889" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-09-18 10:30
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://securitytracker.com/id?1023123 | ||
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb09-16.html | ||
cve@mitre.org | http://www.exploit-db.com/exploits/9682 | ||
cve@mitre.org | http://www.securityfocus.com/bid/36905 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2009/3134 | Vendor Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1023123 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb09-16.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.exploit-db.com/exploits/9682 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/36905 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3134 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2616516-18CA-4F56-803F-8CD3DBC56006", "versionEndIncluding": "11.5.1.601", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the SwDir.dll ActiveX control in Adobe Shockwave Player 11.5.1.601 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long PlayerVersion property value." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en el control ActiveX de la biblioteca SwDir.dll en Shockwave Player de Adobe versiones 11.5.1.601 y anteriores, permite a los atacantes remotos causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo arbitrario por medio de un valor de propiedad PlayerVersion largo." } ], "id": "CVE-2009-3244", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-09-18T10:30:01.500", "references": [ { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023123" }, { "source": "cve@mitre.org", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/9682" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/9682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6530" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 16:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb19-20.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir la ejecuci\u00f3n arbitraria de c\u00f3digo." } ], "id": "CVE-2019-7104", "lastModified": "2024-11-21T04:47:34.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T16:29:08.857", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/189929 | US Government Resource | |
psirt@adobe.com | http://www.securityfocus.com/bid/46336 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/189929 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46336 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." }, { "lang": "es", "value": "El m\u00f3dulo TextXtra en Adobe Shockwave Player anterior a v11.5.9.620 no valida correctamente la entrada de datos no especificados, que permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2010-4195", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.177", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46336" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "id": "CVE-2012-0760", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.137", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-11-03 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/516336/100/0/threaded | ||
psirt@adobe.com | http://www.securityfocus.com/bid/46328 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/65258 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-11-03 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516336/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46328 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/65258 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569." }, { "lang": "es", "value": "El m\u00f3dulo Font Xtra.x32 en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un fragmento PFR1 especialmente dise\u00f1ado que conlleva a una extensi\u00f3n de signo inesperada y una desreferencia de puntero no v\u00e1lida, una vulnerabilidad diferente de CVE-2011-0569." } ], "id": "CVE-2011-0556", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:32.300", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516336/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46328" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516336/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65258" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player antes de v11.6.0.626 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria ) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE -2011- 0317, CVE -2011- 0318, CVE -2011- 0320, CVE -2011- 0335, CVE -2011- 2119, CVE- 2011 y 2122." } ], "id": "CVE-2011-0319", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:01.323", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-11-01 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/516332/100/0/threaded | ||
psirt@adobe.com | http://www.securityfocus.com/bid/46319 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-11-01 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516332/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46319 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588." }, { "lang": "es", "value": "El m\u00f3dulo dirapi.dll de Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una pel\u00edcula Director con un fragmento IFWV con un campo de tama\u00f1o 0, que es usado en el c\u00e1lculo de un desplazamiento de archivo y causa que los datos no v\u00e1lidos sean usados como un contador de bucle, desencadenando un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria, una vulnerabilidad diferente de CVE-2010-2587 y CVE-2010-2588." } ], "id": "CVE-2010-4188", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.863", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46319" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-11 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 | |
adobe | shockwave_player | 12.0.3.133 | |
adobe | shockwave_player | 12.0.4.144 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4E387AD-12D0-4799-81CB-24F08E8D0D82", "versionEndIncluding": "12.0.6.147", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5334." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a la versi\u00f3n 12.0.7.148 permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2013-5334." } ], "id": "CVE-2013-5333", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-11T15:55:07.120", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/189929 | US Government Resource | |
psirt@adobe.com | http://www.securityfocus.com/bid/46338 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/189929 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46338 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." }, { "lang": "es", "value": "El m\u00f3dulo Shockwave 3d Asset de Adobe Shockwave Player en versiones anteriores a la 11.5.9.620 no valida apropiadamente datos de entrada sin especificar, lo que permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2010-4196", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.237", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46338" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/73027 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/48290 | ||
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/68052 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/73027 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48290 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/68052 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a v11.6.0.626 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria ) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE -2011- 2114, CVE -2011- 2117, CVE -2011- 2124, CVE- 2011 y 2127." } ], "id": "CVE-2011-2128", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.760", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73027" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48290" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68052" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2111 and CVE-2011-2115." }, { "lang": "es", "value": "IML32.dll en Adobe Shockwave Player en versiones anteriores a v11.6.0.626 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria ) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE -2011- 2111 y CVE- 2011 - 2115." } ], "id": "CVE-2011-2116", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.337", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow." }, { "lang": "es", "value": "Un desbordamiento de enteros en el componente Shockwave 3D Asset (32 bits) en Adobe Shockwave Player anterior a versi\u00f3n 11.6.0.626, permite que los atacantes remotos ejecuten c\u00f3digo arbitrario por medio de un subregistro especialmente dise\u00f1ado en un fragmento DEMX, lo que desencadena un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria." } ], "id": "CVE-2011-2123", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.587", "references": [ { "source": "psirt@adobe.com", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-10 03:48
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "04161DD0-126A-443E-96F5-6038B6F5249B", "versionEndIncluding": "12.0.0.112", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v12.0.2.122 permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, Se trata de una vulnerabilidad diferente a CVE-2013-1384." } ], "id": "CVE-2013-1386", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-10T03:48:20.477", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted FFFFFF45h Shockwave 3D blocks in a Shockwave file.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/38751 | Not Applicable | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-17/ | Not Applicable | |
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/511260/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required | |
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477 | Tool Signature | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-17/ | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511260/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477 | Tool Signature |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted FFFFFF45h Shockwave 3D blocks in a Shockwave file." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante bloques Shockwave 3D FFFFFF45h manipulados en un fichero Shockwave." } ], "id": "CVE-2010-0127", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:01.717", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-17/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511260/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/secunia_research/2010-17/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511260/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7477" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513307/100/0/threaded | ||
psirt@adobe.com | http://www.securityfocus.com/bid/42682 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | http://www.zerodayinitiative.com/advisories/ZDI-10-162 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513307/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/42682 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-10-162 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.8.612 no valida correctamente valores de offset (desplazamiento de pedazo) en el rcsL RIFF manipulado de (1) .DIR y (2) pel\u00edculas .DCR de Director, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una pel\u00edcula manipulada." } ], "id": "CVE-2010-2873", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.090", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513307/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/42682" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513307/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12042" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4309.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4309." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2010-4309." } ], "id": "CVE-2010-4308", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:00.770", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/19009 | Vendor Advisory | |
cve@mitre.org | http://securityreason.com/securityalert/481 | ||
cve@mitre.org | http://securitytracker.com/id?1015673 | ||
cve@mitre.org | http://www.kb.cert.org/vuls/id/437212 | US Government Resource | |
cve@mitre.org | http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html | ||
cve@mitre.org | http://www.osvdb.org/23461 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/425900/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/16791 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/0716 | ||
cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-06-002.html | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24914 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/19009 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/481 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015673 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/437212 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/23461 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/425900/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/16791 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/0716 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-06-002.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24914 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 10.1.0.11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in an ActiveX control for the installer for Adobe Macromedia Shockwave Player 10.1.0.11 and earlier allows remote attackers to execute arbitrary code via crafted large values for unspecified parameters." } ], "id": "CVE-2005-3525", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19009" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/481" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015673" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/437212" }, { "source": "cve@mitre.org", "url": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/23461" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/425900/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16791" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0716" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/437212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.macromedia.com/devnet/security/security_zone/apsb06-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/23461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/425900/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-06-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24914" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 04:36
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/49086 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-13.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/53420 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1027037 | ||
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/75460 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49086 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-13.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53420 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1027037 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75460 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C4C28C-392E-444D-8358-5E91C9401814", "versionEndIncluding": "11.6.4.634", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2032, and CVE-2012-2033." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.5.635 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, y CVE-2012-2032." } ], "id": "CVE-2012-2031", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T04:36:41.323", "references": [ { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/49086" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75460" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a "faulty allocation" and memory corruption.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/516323/100/0/threaded | ||
psirt@adobe.com | http://www.securityfocus.com/bid/46330 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/65259 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516323/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46330 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/65259 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a \"faulty allocation\" and memory corruption." }, { "lang": "es", "value": "Un desbordamiento de enteros en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de una pel\u00edcula Director con un gran valor de conteo en el registro de activos 3D tipo 0xFFFFFF45, que desencadena un \"faulty allocation\" y la corrupci\u00f3n de memoria." } ], "id": "CVE-2011-0557", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:32.347", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516323/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46330" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516323/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65259" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/73011 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/48309 | ||
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/68050 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/73011 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48309 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/68050 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "B\u00fafer Overflow en Adobe Shockwave Player en versiones anteriores a 11.6.0.626 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2126", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.683", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73011" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48309" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68050" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68050" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-11-05 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Use-after-free vulnerability in an unspecified compatibility component in Adobe Shockwave Player before 11.5.9.620 allows user-assisted remote attackers to execute arbitrary code via a crafted web site, related to the Shockwave Settings window and an unloaded library. NOTE: some of these details are obtained from third party information.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/68982 | ||
psirt@adobe.com | http://secunia.com/advisories/42112 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | ||
psirt@adobe.com | http://www.securityfocus.com/bid/44617 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/62978 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/68982 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42112 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/44617 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/62978 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in an unspecified compatibility component in Adobe Shockwave Player before 11.5.9.620 allows user-assisted remote attackers to execute arbitrary code via a crafted web site, related to the Shockwave Settings window and an unloaded library. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Una vulnerabilidad de uso de memoria previamente liberada en un componente de compatibilidad no especificado en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes remotos asistidos por el usuario ejecutar c\u00f3digo arbitrario por medio de un sitio web especialmente dise\u00f1ado, relacionado con la ventana Configuraci\u00f3n de Shockwave y una biblioteca descargada. NOTA: algunos de estos datos se obtienen de la informaci\u00f3n de terceros." } ], "id": "CVE-2010-4092", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-11-05T21:00:01.437", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/68982" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42112" }, { "source": "psirt@adobe.com", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/44617" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62978" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/68982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/44617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11548" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-06-25 01:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.0.600 allows remote attackers to execute arbitrary code via crafted Shockwave Player 10 content.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/35544 | Vendor Advisory | |
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb09-08.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/35469 | ||
cve@mitre.org | http://www.securitytracker.com/id?1022440 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35544 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb09-08.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35469 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022440 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.5.0.595 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBD5E4-ED8C-4CCB-B71F-96F1B3B8CF20", "versionEndIncluding": "11.5.0.596", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.0.600 allows remote attackers to execute arbitrary code via crafted Shockwave Player 10 content." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Adobe Shockwave Player anterior a v11.5.0.600 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de contenido Shockwave Player 10 manipulado." } ], "id": "CVE-2009-1860", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-06-25T01:30:01.703", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35544" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/35469" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35469" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022440" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-11 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5333.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 | |
adobe | shockwave_player | 12.0.3.133 | |
adobe | shockwave_player | 12.0.4.144 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4E387AD-12D0-4799-81CB-24F08E8D0D82", "versionEndIncluding": "12.0.6.147", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.7.148 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-5333." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a la versi\u00f3n 12.0.7.148 permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2013-5333." } ], "id": "CVE-2013-5334", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-11T15:55:07.167", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb13-29.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "id": "CVE-2012-0757", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:01.933", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-11-08 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-27.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1026288 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-27.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026288 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CF0DAD5-B014-41C6-B3F4-B4770DEE2940", "versionEndIncluding": "11.6.1.629", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Sockwave Player antes de v11.6.3.633 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2447", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-08T22:55:01.083", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1026288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026288" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-12 13:28
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3360.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-23.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-23.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D33992BA-E5D9-4134-AABC-0E7EEE6B619A", "versionEndIncluding": "12.0.3.133", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3360." }, { "lang": "es", "value": "Adobe Shockwave Player anteriores a 12.0.4.144 permite a atacantes ejecutar c\u00f3digo a discrecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2013-3360." } ], "id": "CVE-2013-3359", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-12T13:28:24.557", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-23.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513331/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513331/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x47 of a certain file." }, { "lang": "es", "value": "DIRAPI.dll en Adobe Shockwave Player anterior a v11.5.8.612 no parsea adecuadamente archivos .dir, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo mal formado que contiene un valor no v\u00e1lido, como se demostr\u00f3 con un valor de la posici\u00f3n 0x47 de ciertos ficheros." } ], "id": "CVE-2010-2880", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.357", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513331/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513331/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12012" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/46325 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46325 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.9.620 permite a atacantes a ejecutar c\u00f3digo o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no espec\u00edficos, vulnerabilidad diferente a CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, y CVE-2010-4306." } ], "id": "CVE-2010-4191", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.973", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46325" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1024664 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024664 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en dirapi.dll de Adobe Shockwave Player anterior a v11.5.9.615 permite a los atacantes ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-3655", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.107", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12077" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2128.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/73032 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/48289 | ||
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/68051 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/73032 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48289 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/68051 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2128." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente de CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, y CVE-2011-2128." } ], "id": "CVE-2011-2127", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.730", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73032" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48289" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68051" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to rcsL substructures, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2119.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/73029 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/518439/100/0/threaded | ||
psirt@adobe.com | http://www.securityfocus.com/bid/48297 | ||
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/73029 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/518439/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48297 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to rcsL substructures, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2119." }, { "lang": "es", "value": "En la biblioteca Dirapi.dll en Adobe Shockwave Player anterior a versi\u00f3n 11.6.0.626 permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de vectores no especificados relacionados con subestructuras rcsL, una vulnerabilidad diferente de CVE-2011-0317, CVE-2011-0318 , CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, y CVE-2011-2119." } ], "id": "CVE-2011-2122", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.543", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73029" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/518439/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48297" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518439/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513339/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513339/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file." }, { "lang": "es", "value": "DIRAPI.dll en dobe Shockwave Player anterior a v11.5.8.612 no parsea correctamente ficheros .dir, lo que puede dar lugar a que atacantes remotos generen una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o ejecutar c\u00f3digo arbitrario mediante un fichero malformado conteniendo un valor no v\u00e1lido, como lo demuestra un valor en la posici\u00f3n 0x3812 de un determinado archivo." } ], "id": "CVE-2010-2882", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.420", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513339/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513339/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12069" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2124, CVE-2011-2127, and CVE-2011-2128." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente de CVE-2011-2114, CVE-2011-2124, CVE-2011-2127 y CVE-2011-2128. \r\n\r\n" } ], "id": "CVE-2011-2117", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.370", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Textra.x32 in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Textra.x32 in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Textra.x32 en Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2422", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:01.613", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-10 10:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-18.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id/1028758 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-18.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1028758 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 | |
adobe | shockwave_player | 12.0.0.112 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDAB66DE-DE3E-448B-8159-B3686A084CCA", "versionEndIncluding": "12.0.2.122", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.3.133 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a 12.0.3.133 permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-3348", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-10T10:55:02.487", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1028758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-18.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028758" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player anterior a v11.6.0.626, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Vulnerabilidades distintas a CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, y CVE-2011-2122." } ], "id": "CVE-2011-0318", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:01.277", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-10-10 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513298/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-10-10 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513298/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a value associated with a buffer seek for a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." }, { "lang": "es", "value": "DIRAPIX.dll en Adobe Shockwave Player anterior a v11.5.8.612 no valida adecuadamente los valores asociados al b\u00fafer de b\u00fasqueda de\r\n una pel\u00edcula de Director, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica -heap-) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una pel\u00edcula manipulada.\r\n" } ], "id": "CVE-2010-2878", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.280", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513298/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513298/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11883" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds "seek" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/516324/100/0/threaded | ||
psirt@adobe.com | http://www.securityfocus.com/bid/46324 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
psirt@adobe.com | http://www.zerodayinitiative.com/advisories/ZDI-11-080/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516324/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46324 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-11-080/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds \"seek\" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.9.620 permite que los atacantes ejecuten c\u00f3digo arbitrario o provoquen una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante una pel\u00edcula Director con un fragmento RIFF CSWV que provoca un c\u00e1lculo incorrecto de un desplazamiento para una subestructura, lo que provoca un \"seek\" fuera de l\u00edmites de la memoria din\u00e1mica (heap). Esta vulnerabilidad es diferente de CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192 y CVE-2010-4306." } ], "id": "CVE-2010-4190", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.940", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516324/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46324" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516324/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-080/" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
msvcr90.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/74429 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/69133 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/74429 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/69133 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "msvcr90.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "msvcr90.dll en Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2423", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:01.647", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/74429" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/74429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69133" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 04:36
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2033.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/49086 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-13.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/53420 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1027037 | ||
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/75461 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49086 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-13.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53420 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1027037 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75461 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C4C28C-392E-444D-8358-5E91C9401814", "versionEndIncluding": "11.6.4.634", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2033." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.5.635 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, y CVE-2012-2032." } ], "id": "CVE-2012-2032", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T04:36:41.387", "references": [ { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/49086" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75461" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/189929 | US Government Resource | |
psirt@adobe.com | http://www.securityfocus.com/bid/46335 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/189929 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46335 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors." }, { "lang": "es", "value": "El m\u00f3dulo dirapi.dll en Adobe Shockwave Player anterior a v11.5.9.620 no valida de forma adecuada datos de entrada no especificada, lo que permite a atacantes a ejecutar c\u00f3digo de a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2010-4194", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.130", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/46335" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/189929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-02-13 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-06.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA13-043A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-06.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA13-043A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F907CF9F-BDEC-46D4-A6C4-B345A8003732", "versionEndIncluding": "11.6.8.638", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.0.112 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player antes v 12.0.0.112 permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-0635", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-13T21:55:06.697", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA13-043A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Iml32.dll en Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2419", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:01.520", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/40087 | Third Party Advisory, VDB Entry | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/40087 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1290, and CVE-2010-1291." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027\r\n", "id": "CVE-2010-1289", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.627", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40087" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6652" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1284, CVE-2010-1287, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1286", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.517", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7269" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-10 03:48
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.2.122 does not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "04161DD0-126A-443E-96F5-6038B6F5249B", "versionEndIncluding": "12.0.0.112", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.2.122 does not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v12.0.2.122 no impide el acceso a informaci\u00f3n de direcciones de memoria, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes para eludir el mecanismo de protecci\u00f3n ASLR a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-1385", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-10T03:48:20.460", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html | Broken Link | |
psirt@adobe.com | http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html | Not Applicable | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/511254/100/0/threaded | Third Party Advisory, VDB Entry | |
psirt@adobe.com | http://www.securityfocus.com/bid/40088 | Third Party Advisory, VDB Entry | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required, Third Party Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388 | Third Party Advisory, Tool Signature | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html | Not Applicable | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511254/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/40088 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388 | Third Party Advisory, Tool Signature |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.7.609 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito y consumo de CPU) a trav\u00e9s de la manipulaci\u00f3n del tama\u00f1o de un fichero .dir (tambi\u00e9n conocido como Director)" } ], "id": "CVE-2010-1282", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:02.093", "references": [ { "source": "psirt@adobe.com", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html" }, { "source": "psirt@adobe.com", "tags": [ "Not Applicable" ], "url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40088" }, { "source": "psirt@adobe.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511254/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7388" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-15 10:31
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28CEA80-DD20-47B7-92B1-4ABA569EB5C6", "versionEndIncluding": "11.6.5.635", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2046, and CVE-2012-2047." }, { "lang": "es", "value": "\r\nAdobe Shockwave Player antes de v11.6.6.636 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente a CVE-2012-2043, CVE-2012-2044, CVE-2012-2046 y CVE-2012-2047.\r\n" } ], "id": "CVE-2012-2045", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-15T10:31:40.803", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/46316 | ||
PSIRT-CNA@flexerasoftware.com | http://www.securitytracker.com/id?1025056 | ||
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/65243 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46316 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/65243 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188." }, { "lang": "es", "value": "El m\u00f3dulo dirapi.dll en Adobe Shockwave Player anterior a v11.5.9.620 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente que CVE-2010-2588 y CVE-2010-4188." } ], "id": "CVE-2010-2587", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:01.880", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/46316" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65243" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-10-09 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513296/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-10-09 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513296/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.8.612 no valida correctamente un valor de contador en una pel\u00edcula de Director, lo cual permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n en la pila de memoria) o ejecutar c\u00f3digo arbitrario a trav\u00e9s de una pel\u00edcula manipulada, relacionado con IML32X.dll y DIRAPIX.dll." } ], "id": "CVE-2010-2877", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.233", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513296/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-10-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513296/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11895" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
Integer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via a crafted .dir (aka Director) file.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/38751 | Not Applicable, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-22/ | Not Applicable, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/511263/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/40084 | Broken Link, Third Party Advisory, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required | |
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Not Applicable, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-22/ | Not Applicable, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511263/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/40084 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Shockwave Player before 11.5.7.609 might allow remote attackers to execute arbitrary code via a crafted .dir (aka Director) file." }, { "lang": "es", "value": "Desbordamiento de entero en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s dun fichero .dir (tambi\u00e9n conocido como Director) manipulado." } ], "id": "CVE-2010-0130", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:01.890", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-22/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511263/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40084" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-22/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511263/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7108" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/514578/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024664 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514578/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024664 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Director (.dir) media file with an invalid element size, a different vulnerability than CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4088." }, { "lang": "es", "value": "La biblioteca dirapi.dll en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo multimedia Director (.dir) especialmente dise\u00f1ado con un tama\u00f1o de elemento no v\u00e1lido, una vulnerabilidad diferente de CVE-2010-2581, CVE-2010-2880, CVE-2010-4084, CVE-2010-4085 y CVE-2010-4088." } ], "id": "CVE-2010-4086", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.373", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/514578/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514578/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12030" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 21:30
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
apple | macos | * | |
microsoft | windows | * | |
adobe | shockwave_player | - | |
microsoft | windows_7 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A5F44B-F1F2-4D7F-9F6D-53AE0A192F0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no especificados, una vulnerabilidad diferente a CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1287", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T21:30:01.563", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6803" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "id": "CVE-2012-0763", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.307", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 04:36
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/49086 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-13.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/53420 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1027037 | ||
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/75462 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49086 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-13.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53420 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1027037 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75462 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C4C28C-392E-444D-8358-5E91C9401814", "versionEndIncluding": "11.6.4.634", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, and CVE-2012-2032." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.5.635 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, y CVE-2012-2032." } ], "id": "CVE-2012-2033", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T04:36:41.417", "references": [ { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/49086" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75462" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/38751 | Broken Link, Vendor Advisory | |
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/511252/100/0/threaded | Broken Link, VDB Entry | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/1128 | Broken Link, Vendor Advisory | |
psirt@adobe.com | http://www.zerodayinitiative.com/advisories/ZDI-10-087/ | Third Party Advisory, VDB Entry | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268 | Broken Link, Tool Signature | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511252/100/0/threaded | Broken Link, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-10-087/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268 | Broken Link, Tool Signature |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file." }, { "lang": "es", "value": "iml32.dll en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 no valida un cierto valor de un archivo antes de usarlo en los c\u00e1lculos de punteros de ficheros, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante un fichero .dir (tambi\u00e9n conocido como Director) manipulado." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-1281", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:02.030", "references": [ { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511252/100/0/threaded" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511252/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-087/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513312/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | http://www.zerodayinitiative.com/advisories/ZDI-10-164 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513312/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-10-164 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.8.612 does not properly validate values associated with buffer-size calculation for a 0xFFFFFFF8 record in a (1) .dir or (2) .dcr Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.8.612 no valida adecuadamente los valores asociados con el c\u00e1lculo del tama\u00f1o de b\u00fafer para un registro 0xFFFFFFF8 en archivos (1) .dir o (2) .dcr de una pel\u00edcula de Director, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica -heap-) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una pel\u00edcula manipulada.\r\n" } ], "id": "CVE-2010-2876", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.187", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513312/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-164" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513312/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11805" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-11-04 15:30
Modified
2025-04-09 00:30
Severity ?
Summary
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an "invalid pointer vulnerability," a different issue than CVE-2009-3465. NOTE: some of these details are obtained from third party information.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://securitytracker.com/id?1023123 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb09-16.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/36905 | Patch | |
psirt@adobe.com | http://www.vupen.com/english/advisories/2009/3134 | Vendor Advisory | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/54119 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1023123 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb09-16.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/36905 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3134 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/54119 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2616516-18CA-4F56-803F-8CD3DBC56006", "versionEndIncluding": "11.5.1.601", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an \"invalid pointer vulnerability,\" a different issue than CVE-2009-3465. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Adobe Shockwave Player anerior a v11.5.2.602, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s un contenido Shockwave manipulado en una p\u00e1gina web. Relacionado con la \"vulnerabilidad de puntero inv\u00e1lido. Cuesti\u00f3n distinta de CVE-2009-3465. NOTA: algunos de estos detalles han sido obtenidos a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-3464", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-04T15:30:00.577", "references": [ { "source": "psirt@adobe.com", "url": "http://securitytracker.com/id?1023123" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/36905" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54119" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-16.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/36905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/3134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6394" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-11-08 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The TextXtra module in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-27.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1026288 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-27.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026288 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CF0DAD5-B014-41C6-B3F4-B4770DEE2940", "versionEndIncluding": "11.6.1.629", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TextXtra module in Adobe Shockwave Player before 11.6.3.633 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "El m\u00f3dulo TextXtra en Adobe Sockwave Player antes de v11.6.3.633 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados" } ], "id": "CVE-2011-2449", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-11-08T22:55:01.160", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1026288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-27.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026288" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-15 10:31
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28CEA80-DD20-47B7-92B1-4ABA569EB5C6", "versionEndIncluding": "11.6.5.635", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2044, CVE-2012-2045, CVE-2012-2046, and CVE-2012-2047." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.6.636 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente a CVE-2012-2044, CVE-2012-2045, CVE-2012-2046 y CVE-2012-2047.\r\n" } ], "id": "CVE-2012-2043", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-15T10:31:40.727", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-14 16:59
Modified
2025-04-20 01:37
Severity ?
Summary
Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.securityfocus.com/bid/96863 | ||
psirt@adobe.com | http://www.securitytracker.com/id/1037993 | ||
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb17-08.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96863 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037993 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb17-08.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D35B9AD-40AB-4819-9D86-8FC4FCF6E2A1", "versionEndIncluding": "12.2.7.197", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege." }, { "lang": "es", "value": "Adobe Shockwave versi\u00f3n 12.2.7.197 y versiones anteriores tienen una vulnerabilidad de carga de librer\u00eda insegura (secuestro de DLL). Una explotaci\u00f3n exitosa podr\u00eda conducir a escalada de privilegios." } ], "id": "CVE-2017-2983", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-14T16:59:00.163", "references": [ { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/96863" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1037993" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/96863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037993" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-08.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4308.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-4308." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2010-4308." } ], "id": "CVE-2010-4309", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:00.817", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n exitosa conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7101", "lastModified": "2024-11-21T04:47:33.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.470", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-19 19:29
Modified
2024-11-21 01:35
Severity ?
Summary
Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | https://www.adobe.com/support/security/bulletins/apsb12-02.html | Vendor Advisory | |
nvd@nist.gov | https://fortiguard.com/encyclopedia/ips/31101/adobe-shockwave-player-multiple-memory-corruption | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.adobe.com/support/security/bulletins/apsb12-02.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E21770D-7354-44C4-AAA3-6BB1DB0B9392", "versionEndExcluding": "11.6.4.634", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0759." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a la 11.6.4.634 permite que los atacantes ejecuten c\u00f3digo arbitrario o provoquen una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) mediante vectores no especificados. Esta es una vulnerabilidad diferente de CVE-2012-0759." } ], "id": "CVE-2012-0771", "lastModified": "2024-11-21T01:35:41.793", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-19T19:29:00.313", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "nvd@nist.gov", "tags": [ "Third Party Advisory" ], "url": "https://fortiguard.com/encyclopedia/ips/31101/adobe-shockwave-player-multiple-memory-corruption" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.adobe.com/support/security/bulletins/apsb12-02.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-15 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/79241 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/52001 | ||
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/73174 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/79241 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-02.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/52001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/73174 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8902C5F-A8A6-4D41-A7F9-B12C89EACA23", "versionEndIncluding": "11.6.3.633", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Shockwave 3D Asset component in Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0757, CVE-2012-0760, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, and CVE-2012-0766." }, { "lang": "es", "value": "El componente Shockwave 3D Asset en Adobe Shockwave Player antes de v11.6.4.634, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Una vulnerabilidad diferente de CVE-2012-0757, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0764, and CVE-2012-0766." } ], "id": "CVE-2012-0761", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-15T01:55:02.213", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/79241" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/52001" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/79241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73174" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 04:36
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/49086 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-13.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/53420 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1027037 | ||
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/75458 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49086 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-13.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53420 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1027037 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75458 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C4C28C-392E-444D-8358-5E91C9401814", "versionEndIncluding": "11.6.4.634", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.5.635 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2012-2030, CVE-2012-2031, CVE-2012-2032 y CVE-2012-2033." } ], "id": "CVE-2012-2029", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T04:36:41.243", "references": [ { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/49086" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75458" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://dvlabs.tippingpoint.com/advisory/TPTI-11-05 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/516335/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1025056 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2011/0335 | ||
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/65260 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://dvlabs.tippingpoint.com/advisory/TPTI-11-05 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/516335/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/65260 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556." }, { "lang": "es", "value": "El m\u00f3dulo Font Xtra.x32 en Adobe Shockwave Player anterior a 11.5.9.620 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2011-0556." } ], "id": "CVE-2011-0569", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:32.567", "references": [ { "source": "psirt@adobe.com", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/516335/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/516335/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65260" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-20 17:29
Modified
2025-04-20 01:37
Severity ?
Summary
Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.securityfocus.com/bid/99019 | Third Party Advisory, VDB Entry | |
psirt@adobe.com | http://www.securitytracker.com/id/1038656 | ||
psirt@adobe.com | https://fortiguard.com/zeroday/FG-VD-16-036 | ||
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb17-18.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99019 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038656 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/zeroday/FG-VD-16-036 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb17-18.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9A4839D-5A9B-4E5E-B253-050099B95EA1", "versionEndIncluding": "12.2.8.198", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Adobe Shockwave versiones 12.2.8.198 y anteriores, tienen una vulnerabilidad explotable de corrupci\u00f3n de memoria. Una explotaci\u00f3n exitosa podr\u00eda llevar a la ejecuci\u00f3n remota de c\u00f3digo." } ], "id": "CVE-2017-3086", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-20T17:29:00.440", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99019" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1038656" }, { "source": "psirt@adobe.com", "url": "https://fortiguard.com/zeroday/FG-VD-16-036" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://fortiguard.com/zeroday/FG-VD-16-036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb17-18.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-26 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/archive/1/513305/100/0/threaded | ||
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | ||
psirt@adobe.com | http://www.zerodayinitiative.com/advisories/ZDI-10-160 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/513305/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-10-160 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the 3D object functionality in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted size value in a 0xFFFFFF45 RIFF record in a Director movie." }, { "lang": "es", "value": "Desbordamiento de entero en la funcionalidad 3D en Adobe Shockwave Player anterior a 11.5.8.612, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria din\u00e1mica -heap-) o la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un tama\u00f1o con un valor manipulado en un registro 0xFFFFFF45 RIFF en una pel\u00edcula de Director." } ], "id": "CVE-2010-2871", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-26T21:00:02.013", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/archive/1/513305/100/0/threaded" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-160" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/513305/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-160" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11970" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-12-20 12:02
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of a Shockwave Player 10.4.0.025 compatibility feature via a crafted HTML document that references Shockwave content with a certain compatibility parameter, related to a "downgrading" attack.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.kb.cert.org/vuls/id/323161 | ||
cret@cert.org | http://www.kb.cert.org/vuls/id/546769 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/323161 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/546769 | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F907CF9F-BDEC-46D4-A6C4-B345A8003732", "versionEndIncluding": "11.6.8.638", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player through 11.6.8.638 allows remote attackers to trigger installation of a Shockwave Player 10.4.0.025 compatibility feature via a crafted HTML document that references Shockwave content with a certain compatibility parameter, related to a \"downgrading\" attack." }, { "lang": "es", "value": "Adobe Shockwave Player hasta v11.6.8.638 permite a atacantes remotos provocar la instalaci\u00f3n de una caracter\u00edstica de compatibilidad de Shockwave Player v10.4.0.025 a trav\u00e9s de un documento HTML modificado que referencia al contenido Sockwave con algunos par\u00e1metros de compatibilidad, relacionado con un ataque de \"downgrading\"" } ], "id": "CVE-2012-6270", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-12-20T12:02:19.980", "references": [ { "source": "cret@cert.org", "url": "http://www.kb.cert.org/vuls/id/323161" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/546769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.kb.cert.org/vuls/id/323161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/546769" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-12 04:50
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://helpx.adobe.com/security/products/shockwave/apsb14-06.html | Vendor Advisory | |
psirt@adobe.com | http://osvdb.org/103158 | ||
psirt@adobe.com | http://secunia.com/advisories/56740 | ||
psirt@adobe.com | http://www.securityfocus.com/bid/65493 | ||
psirt@adobe.com | http://www.securitytracker.com/id/1029740 | ||
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/91008 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://helpx.adobe.com/security/products/shockwave/apsb14-06.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/103158 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/56740 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/65493 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1029740 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/91008 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 | |
adobe | shockwave_player | 12.0.3.133 | |
adobe | shockwave_player | 12.0.4.144 | |
adobe | shockwave_player | 12.0.6.147 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C4B100C-6C43-4BEF-AD9C-680C7764A41E", "versionEndIncluding": "12.0.7.148", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.6.147:*:*:*:*:*:*:*", "matchCriteriaId": "FC110854-7ACE-44E5-B73A-8A1EBD2AD84A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a 12.0.9.149 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0500." } ], "id": "CVE-2014-0501", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-12T04:50:41.343", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/103158" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/56740" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/65493" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1029740" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/103158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1024664 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024664 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." }, { "lang": "es", "value": "dirapi.dll en Adobe Shockwave Player anterior a v11.5.9.615 permite a los atacantes ejecutar c\u00f3digo a su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente que CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, y CVE-2010-4088." } ], "id": "CVE-2010-4084", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.277", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12265" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-23 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/86541 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/56187 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/86541 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-23.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/56187 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A08E7E4-39F3-465D-A96F-8450AC5D4F1F", "versionEndIncluding": "11.6.7.637", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, and CVE-2012-4175." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player antes de v11.6.8.638 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2012-4172, CVE-2012-4173, CVE-2012-4174, y CVE-2012-4175." } ], "id": "CVE-2012-5273", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-23T23:55:01.677", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86541" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/56187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56187" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, and CVE-2010-4088.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1024664 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024664 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, and CVE-2010-4088." }, { "lang": "es", "value": "dirapi.dll en Adobe Shockwave Player anterior a v11.5.9.615 permite a los atacantes ejecutar c\u00f3digo a su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente que CVE-2010-2581, CVE-2010-4084, CVE-2010-4086, y CVE-2010-4088." } ], "id": "CVE-2010-4085", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:02.327", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11518" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-15 10:31
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-17.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28CEA80-DD20-47B7-92B1-4ABA569EB5C6", "versionEndIncluding": "11.6.5.635", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.6.636 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2043, CVE-2012-2044, CVE-2012-2045, and CVE-2012-2047." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.6.636 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (por corrupci\u00f3n de la memoria) a trav\u00e9s de vectores no especificados. Se trata de una vulnerabilidad diferente a CVE-2012-2043, CVE-2012-2044, CVE-2012-2045 y CVE-2012-2047.\r\n" } ], "id": "CVE-2012-2046", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-15T10:31:40.867", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-17.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/46333 | ||
cve@mitre.org | http://www.securitytracker.com/id?1025056 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46333 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.5.9.620 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente que CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192." } ], "id": "CVE-2010-4306", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:13.287", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/46333" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player anterior a v11.6.0.626 permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados. Vulnerabilidad distinta de CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335 y CVE-2011-2122." } ], "id": "CVE-2011-2119", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.433", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n con \u00e9xito conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7098", "lastModified": "2024-11-21T04:47:33.583", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.330", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
The FLV ASSET Xtra component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to an "input validation vulnerability."
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FLV ASSET Xtra component in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to an \"input validation vulnerability.\"" }, { "lang": "es", "value": "El componente FLV ASSET Xtra en Adobe Shockwave Player anterior a v11.6.0.626 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores desconocidos, relacionada con una \"vulnerabilidad de validaci\u00f3n de entrada\"." } ], "id": "CVE-2011-2118", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.400", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-09 04:36
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://secunia.com/advisories/49086 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb12-13.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/53420 | ||
psirt@adobe.com | http://www.securitytracker.com/id?1027037 | ||
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/75459 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49086 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb12-13.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53420 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1027037 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75459 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ACB8E1-7E32-4000-940F-F6123A8F1A7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "51C4C28C-392E-444D-8358-5E91C9401814", "versionEndIncluding": "11.6.4.634", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*", "matchCriteriaId": "566C54A7-934B-4C58-9DED-5FD87B31B35A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.5.635 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2029, CVE-2012-2031, CVE-2012-2032, and CVE-2012-2033." }, { "lang": "es", "value": "Adobe Shockwave Player antes de v11.6.5.635 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente de CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, CVE-2012-2032 y CVE-2012-2033." } ], "id": "CVE-2012-2030", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-09T04:36:41.277", "references": [ { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/49086" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75459" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html | Broken Link | |
PSIRT-CNA@flexerasoftware.com | http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html | Broken Link, Third Party Advisory | |
PSIRT-CNA@flexerasoftware.com | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869 | Broken Link | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/38751 | Broken Link, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-20/ | Broken Link, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/511256/100/0/threaded | Broken Link, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/511262/100/0/threaded | Broken Link, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/40082 | Broken Link, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2010/1128 | Broken Link, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-20/ | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511256/100/0/threaded | Broken Link, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511262/100/0/threaded | Broken Link, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/40082 | Broken Link, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A79D960-7961-4737-B69E-C070DA62C9AD", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de enteros en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero .dir (tambi\u00e9n conocido como Director) manipulado que dispara un error de indice de matriz." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-0129", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2010-05-13T17:30:01.827", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-20/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511256/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511262/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40082" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-20/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511256/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511262/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/40082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7134" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-10-28 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
Adobe Shockwave Player before 12.2.1.171 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.securitytracker.com/id/1033990 | ||
psirt@adobe.com | https://helpx.adobe.com/security/products/shockwave/apsb15-26.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033990 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/shockwave/apsb15-26.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "175F749A-2D90-4049-B60B-2888F7041EF3", "versionEndIncluding": "12.2.0.162", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.2.1.171 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player en versiones anteriores a 12.2.1.171 permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-7649", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-28T18:59:06.250", "references": [ { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1033990" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb15-26.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-09-07 18:00
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securitytracker.com/id?1024361 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2176 | Vendor Advisory | |
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-20.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2176 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B686A7C-8758-4F36-90DD-560B6A372576", "versionEndIncluding": "11.5.7.609", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Adobe Shockwave Player anterior a v11.5.8.612 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores desconocidos que desencadenan una corrupci\u00f3n de memoria. NOTA: debido al conflicto de informaci\u00f3n y uso del mismo identificador CVE por el fabricante, ZDI y TippingPoint, no est\u00e1 claro si este problema est\u00e1 relacionado con el uso de un puntero sin inicializar, un c\u00e1lculo de desplazamiento de puntero incorrecto o ambos." } ], "id": "CVE-2010-2874", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-09-07T18:00:02.247", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11924" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116." }, { "lang": "es", "value": "En la biblioteca IML32.dll en Adobe Shockwave Player anterior a versi\u00f3n 11.6.0.626, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un fragmento tSAC especialmente dise\u00f1ado, lo que desencadena un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria, una vulnerabilidad diferente de CVE-2011 -2111 y CVE-2011-2116." } ], "id": "CVE-2011-2115", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.293", "references": [ { "source": "psirt@adobe.com", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to a "design flaw."
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/73012 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/48311 | ||
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/68033 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/73012 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48311 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/68033 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors, related to a \"design flaw.\"" }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.0.626 permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados, relacionados con un \"error de dise\u00f1o\"." } ], "id": "CVE-2011-2108", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.057", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73012" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/48311" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68033" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-113/ | ||
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/514559/100/0/threaded | ||
PSIRT-CNA@flexerasoftware.com | http://www.securitytracker.com/id?1024664 | ||
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-113/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/514559/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024664 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088." }, { "lang": "es", "value": "La biblioteca dirapi.dll en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo Director que contiene un fragmento pamm especialmente dise\u00f1ado con un (1) tama\u00f1o y (2) n\u00famero de sub fragmentos no v\u00e1lidos, una vulnerabilidad diferente de CVE-2010-4084, CVE-2010-4085, CVE-2010-4086 y CVE-2010-4088." } ], "id": "CVE-2010-2581", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-29T19:00:01.560", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/secunia_research/2010-113/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/514559/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/secunia_research/2010-113/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/514559/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12185" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-06-25 01:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Adobe Shockwave Player before 11.0.0.465 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2009-1860, related to an older issue that "was previously resolved in Shockwave Player 11.0.0.465."
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb09-08.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb09-08.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 10.1.0.11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "849BA45D-66E6-495A-B81C-22B49B59212C", "versionEndIncluding": "11.0.0.456", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Adobe Shockwave Player before 11.0.0.465 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2009-1860, related to an older issue that \"was previously resolved in Shockwave Player 11.0.0.465.\"" }, { "lang": "es", "value": "Una vulnerabilidad no especificada en Adobe Shockwave Player anterior a la versi\u00f3n 11.0.0.465 permite que los atacantes remotos ejecuten c\u00f3digo arbitrario por medio de vectores desconocidos, una vulnerabilidad diferente de CVE-2009-1860, relacionada con un problema anterior que \"was previously resolved in Shockwave Player 11.0.0.465.\"" } ], "id": "CVE-2009-2186", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-06-25T01:30:01.813", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-08.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-13 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/advisories/38751 | Broken Link, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-19/ | Broken Link, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.coresecurity.com/content/adobe-director-invalid-read | Broken Link | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/511240/100/0/threaded | Broken Link, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/archive/1/511261/100/0/threaded | Broken Link, VDB Entry | |
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2010/1128 | Broken Link, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273 | Tool Signature | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38751 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-19/ | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.coresecurity.com/content/adobe-director-invalid-read | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511240/100/0/threaded | Broken Link, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/511261/100/0/threaded | Broken Link, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1128 | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273 | Tool Signature |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:director:*:*:*:*:*:*:*:*", "matchCriteriaId": "58C4FCAB-2330-4C95-A969-D2AEBDFA7186", "versionEndExcluding": "11.5.7.609", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "568143B8-4800-4BCE-86DD-B9E410509C48", "versionEndIncluding": "11.5.6.606", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C56F007-5F8E-4BDD-A803-C907BCC0AF55", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation." }, { "lang": "es", "value": "Error de presencia de signo entero en dirapi.dll en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 y Adobe Director en versiones anteriores a la 11.5.7.609 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero .dir (tambi\u00e9n conocido como Director) manipulado que dispara una operaci\u00f3n de lectura inv\u00e1lida." } ], "evaluatorSolution": "Per: http://www.adobe.com/support/security/bulletins/apsb10-12.html\r\n\r\n\u0027Adobe recommends users of Adobe Shockwave Player 11.5.6.606 and earlier versions update to Adobe Shockwave Player 11.5.7.609\u0027", "id": "CVE-2010-0128", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-13T17:30:01.780", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-19/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link" ], "url": "http://www.coresecurity.com/content/adobe-director-invalid-read" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511240/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511261/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/38751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-19/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.coresecurity.com/content/adobe-director-invalid-read" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511240/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/511261/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Tool Signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7273" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple integer overflows in Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://osvdb.org/73033 | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/73033 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allow attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de entero en Dirapi.dll en Adobe Shockwave Player anterior a v11.6.0.626, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2109", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:02.087", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/73033" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/73033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-16 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-17.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A6F040-3CE3-456A-95CA-319EC6704284", "versionEndIncluding": "11.5.9.620", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122." }, { "lang": "es", "value": "Dirapi.dll en Adobe Shockwave Player anterior a v11.6.0.626 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, y CVE-2011-2122." } ], "id": "CVE-2011-0320", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-16T23:55:01.370", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-17.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-19.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-222A.html | US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7985D91-FA0E-4026-86BF-29841FC0E633", "versionEndIncluding": "11.6.0.626", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 11.6.1.629 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a v11.6.1.629 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-2420", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-08-11T22:55:01.553", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-23 17:29
Modified
2024-11-21 04:47
Severity ?
Summary
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A99BF155-2F32-4B06-9D79-C92780345761", "versionEndIncluding": "12.3.4.204", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution." }, { "lang": "es", "value": "Las versiones de Adobe Shockwave Player 12.3.4.204 y anteriores, tienen una vulnerabilidad de corrupci\u00f3n de memoria. Su explotaci\u00f3n exitosa conllevar\u00eda a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2019-7100", "lastModified": "2024-11-21T04:47:33.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-23T17:29:00.423", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/shockwave/apsb19-20.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-26 18:00
Modified
2025-04-11 00:51
Severity ?
Summary
The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/ | ||
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb10-25.html | ||
psirt@adobe.com | http://www.exploit-db.com/exploits/15296 | Exploit | |
psirt@adobe.com | http://www.kb.cert.org/vuls/id/402231 | US Government Resource | |
psirt@adobe.com | http://www.securityfocus.com/bid/44291 | Exploit | |
psirt@adobe.com | http://www.securitytracker.com/id?1024635 | ||
psirt@adobe.com | http://www.vupen.com/english/advisories/2010/2752 | Vendor Advisory | |
psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/62688 | ||
psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb10-25.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.exploit-db.com/exploits/15296 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/402231 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/44291 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024635 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/2752 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/62688 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71F810E-F23E-45FF-94F9-14D09490D018", "versionEndIncluding": "11.5.8.612", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "El m\u00f3dulo Director (biblioteca dirapi.dll) en Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.615, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una pel\u00edcula de Director con un fragmento rcsL dise\u00f1ado que contiene un campo cuyo valor se utiliza como un desplazamiento de puntero, como se explot\u00f3 \u201cin the wild\u201d en octubre de 2010. NOTA: algunos de estos datos se obtienen de la informaci\u00f3n de terceros." } ], "id": "CVE-2010-3653", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-10-26T18:00:01.597", "references": [ { "source": "psirt@adobe.com", "url": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/" }, { "source": "psirt@adobe.com", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "psirt@adobe.com", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15296" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/402231" }, { "source": "psirt@adobe.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/44291" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id?1024635" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2752" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62688" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/15296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/402231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/44291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-10 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/46318 | ||
PSIRT-CNA@flexerasoftware.com | http://www.securitytracker.com/id?1025056 | ||
PSIRT-CNA@flexerasoftware.com | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/65244 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-01.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46318 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025056 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0335 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/65244 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188." }, { "lang": "es", "value": "El m\u00f3dulo dirapi.dll de Adobe Shockwave Player en versiones anteriores a la 11.5.9.620 permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar. Es una vunerabilidad diferente a la CVE-2010-2587 y CVE-2010-4188." } ], "id": "CVE-2010-2588", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-02-10T16:00:12.393", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/46318" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65244" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-04-10 03:48
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb13-12.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 1.0 | |
adobe | shockwave_player | 2.0 | |
adobe | shockwave_player | 3.0 | |
adobe | shockwave_player | 4.0 | |
adobe | shockwave_player | 5.0 | |
adobe | shockwave_player | 6.0 | |
adobe | shockwave_player | 8.0 | |
adobe | shockwave_player | 8.0.196 | |
adobe | shockwave_player | 8.0.196a | |
adobe | shockwave_player | 8.0.204 | |
adobe | shockwave_player | 8.0.205 | |
adobe | shockwave_player | 8.5.1 | |
adobe | shockwave_player | 8.5.1.100 | |
adobe | shockwave_player | 8.5.1.103 | |
adobe | shockwave_player | 8.5.1.105 | |
adobe | shockwave_player | 8.5.1.106 | |
adobe | shockwave_player | 8.5.321 | |
adobe | shockwave_player | 8.5.323 | |
adobe | shockwave_player | 8.5.324 | |
adobe | shockwave_player | 8.5.325 | |
adobe | shockwave_player | 9 | |
adobe | shockwave_player | 9.0.383 | |
adobe | shockwave_player | 9.0.432 | |
adobe | shockwave_player | 10.0.0.210 | |
adobe | shockwave_player | 10.0.1.004 | |
adobe | shockwave_player | 10.1.0.11 | |
adobe | shockwave_player | 10.1.0.011 | |
adobe | shockwave_player | 10.1.1.016 | |
adobe | shockwave_player | 10.1.4.020 | |
adobe | shockwave_player | 10.2.0.021 | |
adobe | shockwave_player | 10.2.0.022 | |
adobe | shockwave_player | 10.2.0.023 | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "04161DD0-126A-443E-96F5-6038B6F5249B", "versionEndIncluding": "12.0.0.112", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Shockwave Player anterior a v12.0.2.122 que permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar." } ], "id": "CVE-2013-1383", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-10T03:48:20.430", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-12.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }