mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-28 17:21:57 +00:00
82 lines
2.6 KiB
JSON
82 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@adobe.com",
|
|
"ID": "CVE-2017-3002",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Adobe Flash Player 24.0.0.221 and earlier.",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "Adobe Flash Player 24.0.0.221 and earlier."
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability in the ActionScript2 TextField object related to the variable property. Successful exploitation could lead to arbitrary code execution."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Use After Free"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "96861",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/96861"
|
|
},
|
|
{
|
|
"name": "https://helpx.adobe.com/security/products/flash-player/apsb17-07.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://helpx.adobe.com/security/products/flash-player/apsb17-07.html"
|
|
},
|
|
{
|
|
"name": "GLSA-201703-02",
|
|
"refsource": "GENTOO",
|
|
"url": "https://security.gentoo.org/glsa/201703-02"
|
|
},
|
|
{
|
|
"name": "1037994",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1037994"
|
|
},
|
|
{
|
|
"name": "RHSA-2017:0526",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0526.html"
|
|
}
|
|
]
|
|
}
|
|
} |