mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
83 lines
2.4 KiB
JSON
83 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "psirt@adobe.com",
|
|
"ID" : "CVE-2017-3002",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "Adobe Flash Player 24.0.0.221 and earlier.",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "Adobe Flash Player 24.0.0.221 and earlier."
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability in the ActionScript2 TextField object related to the variable property. Successful exploitation could lead to arbitrary code execution."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Use After Free"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb17-07.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb17-07.html"
|
|
},
|
|
{
|
|
"name" : "GLSA-201703-02",
|
|
"refsource" : "GENTOO",
|
|
"url" : "https://security.gentoo.org/glsa/201703-02"
|
|
},
|
|
{
|
|
"name" : "RHSA-2017:0526",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0526.html"
|
|
},
|
|
{
|
|
"name" : "96861",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/96861"
|
|
},
|
|
{
|
|
"name" : "1037994",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id/1037994"
|
|
}
|
|
]
|
|
}
|
|
}
|