Описание
Adobe Flash Player version 32.0.0.433 (and earlier) are affected by an exploitable NULL pointer dereference vulnerability that could result in a crash and arbitrary code execution. Exploitation of this issue requires an attacker to insert malicious strings in an HTTP response that is by default delivered over TLS/SSL.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1:20201013.1-0ubuntu0.18.04.1 |
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/focal | DNE | |
| focal | DNE | |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE | |
| upstream | needs-triage | |
| xenial | released | 1:20201013.1-0ubuntu0.16.04.1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 32.0.0.445ubuntu0.18.04.1 |
| devel | DNE | |
| esm-apps/bionic | released | 32.0.0.445ubuntu0.18.04.1 |
| esm-apps/focal | released | 32.0.0.445ubuntu0.20.04.1 |
| esm-apps/xenial | released | 32.0.0.445ubuntu0.16.04.1 |
| esm-infra-legacy/trusty | DNE | |
| focal | released | 32.0.0.445ubuntu0.20.04.1 |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE |
Показывать по
EPSS
9.3 Critical
CVSS2
7 High
CVSS3
Связанные уязвимости
Adobe Flash Player version 32.0.0.433 (and earlier) are affected by an exploitable NULL pointer dereference vulnerability that could result in a crash and arbitrary code execution. Exploitation of this issue requires an attacker to insert malicious strings in an HTTP response that is by default delivered over TLS/SSL.
Adobe Flash Player version 32.0.0.433 (and earlier) are affected by an exploitable NULL pointer dereference vulnerability that could result in a crash and arbitrary code execution. Exploitation of this issue requires an attacker to insert malicious strings in an HTTP response that is by default delivered over TLS/SSL.
Adobe Flash Player version 32.0.0.433 (and earlier) are affected by an exploitable NULL pointer dereference vulnerability that could result in a crash and arbitrary code execution. Exploitation of this issue requires an attacker to insert malicious strings in an HTTP response that is by default delivered over TLS/SSL.
EPSS
9.3 Critical
CVSS2
7 High
CVSS3