The host is installed with Adobe Flash Player before 27.0.0.183 and earlier versions and is prone to an Out-of-bounds Read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead remote attackers to Remote Code Execution.
The host is installed with Adobe Flash Player before 27.0.0.187 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead remote attackers to remote code execution.
The host is installed with Adobe Flash Player before 27.0.0.183 and earlier versions or Google Chrome before 65.0.3325.146 and is prone to an Use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead remote attackers to Remote Code Execution.
The host is installed with Adobe Flash Player before 27.0.0.187 or Google Chrome before 65.0.3325.146 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead remote attackers to remote code execution.
The host is installed with Adobe Flash Player before 27.0.0.183 and earlier versions or Google Chrome before 65.0.3325.146 and is prone to an Use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead remote attackers to Remote Code Execution.
The host is installed with Adobe Flash Player before 27.0.0.187 or Google Chrome before 65.0.3325.146 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead remote attackers to remote code execution.
The host is installed with Adobe Flash Player before 27.0.0.183 and earlier versions and is prone to an Out-of-bounds Read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead remote attackers to Remote Code Execution.
The host is installed with Adobe Flash Player before 27.0.0.187 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead remote attackers to remote code execution.
The host is installed with Adobe Flash Player before 27.0.0.183 and earlier versions and is prone to an Out-of-bounds Read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead remote attackers to Remote Code Execution.
The host is installed with Adobe Flash Player before 27.0.0.187 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead remote attackers to remote code execution.