Описание
Adobe Flash Player versions 32.0.0.156 and earlier, 32.0.0.156 and earlier, and 32.0.0.156 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1:20190409.1-0ubuntu0.18.04.1 |
| cosmic | released | 1:20190409.1-0ubuntu0.18.10.1 |
| devel | released | 1:20190409.1-0ubuntu1 |
| disco | released | 1:20190409.1-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | |
| precise/esm | DNE | |
| trusty | released | 1:20190409.1-0ubuntu0.14.04.1 |
| trusty/esm | DNE | |
| upstream | released | 32.0.0.171 |
| xenial | released | 1:20190409.1-0ubuntu0.16.04.1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 32.0.0.171ubuntu0.18.04.1 |
| cosmic | released | 32.0.0.171ubuntu0.18.10.1 |
| devel | released | 32.0.0.171ubuntu1 |
| disco | released | 32.0.0.171ubuntu1 |
| esm-apps/bionic | released | 32.0.0.171ubuntu0.18.04.1 |
| esm-apps/xenial | released | 32.0.0.171ubuntu0.16.04.1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needs-triage] |
| precise/esm | DNE | |
| trusty | released | 32.0.0.171ubuntu0.14.04.1 |
| trusty/esm | DNE | trusty was needs-triage |
Показывать по
10 Critical
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Adobe Flash Player versions 32.0.0.156 and earlier, 32.0.0.156 and earlier, and 32.0.0.156 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
Adobe Flash Player versions 32.0.0.156 and earlier, 32.0.0.156 and earlier, and 32.0.0.156 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
Adobe Flash Player versions 32.0.0.156 and earlier, 32.0.0.156 and earlier, and 32.0.0.156 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
Уязвимость программных платформ Flash Player, связанная с использованием памяти после её освобождения. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, обойти ограничения безопасности и выполнить произвольный код
10 Critical
CVSS2
9.8 Critical
CVSS3