The host is installed with Adobe Flash Player before 11.2.202.554 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Flash Player before 11.2.202.554 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Flash Player before 11.2.202.554 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to bypass intended access restrictions.
The host is installed with Adobe Flash Player before 11.2.202.554 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to bypass intended access restrictions.
The host is installed with Adobe Flash Player before 11.2.202.554 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to bypass intended access restrictions.
The host is installed with Adobe Flash Player before 11.2.202.554 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to bypass intended access restrictions.
The host is installed with Adobe Flash Player before 11.2.202.554 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle JIT data. Successful exploitation could allow attackers to bypass intended access restrictions.
The host is installed with Adobe Flash Player before 11.2.202.554 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle JIT data. Successful exploitation could allow attackers to bypass intended access restrictions.
The host is installed with Adobe Flash Player before 11.2.202.554 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Flash Player before 11.2.202.554 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.