mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
103 lines
3.2 KiB
JSON
103 lines
3.2 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "psirt@adobe.com",
|
|
"ID" : "CVE-2016-7879",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the NetConnection class when handling an attached script object. Successful exploitation could lead to arbitrary code execution."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Use After Free"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-619",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-619"
|
|
},
|
|
{
|
|
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
|
|
},
|
|
{
|
|
"name" : "GLSA-201701-17",
|
|
"refsource" : "GENTOO",
|
|
"url" : "https://security.gentoo.org/glsa/201701-17"
|
|
},
|
|
{
|
|
"name" : "MS16-154",
|
|
"refsource" : "MS",
|
|
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
|
|
},
|
|
{
|
|
"name" : "RHSA-2016:2947",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SU-2016:3148",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2016:3160",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
|
|
},
|
|
{
|
|
"name" : "94873",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/94873"
|
|
},
|
|
{
|
|
"name" : "1037442",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id/1037442"
|
|
}
|
|
]
|
|
}
|
|
}
|