Total vulnerabilities in the database
Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to bypass intended access restrictions via unspecified vectors.
Software | From | Fixed in |
---|---|---|
adobe / flash_player | - | 23.0.0.162.x |
adobe / flash_player | - | 11.2.202.635.x |
adobe / flash_player | - | 18.0.0.375.x |
adobe / flash_player_desktop_runtime | - | 23.0.0.162.x |
redhat / enterprise_linux_server | 5.0 | 5.0.x |
redhat / enterprise_linux_workstation | 5.0 | 5.0.x |
redhat / enterprise_linux_desktop | 6.0 | 6.0.x |
redhat / enterprise_linux_server | 6.0 | 6.0.x |
redhat / enterprise_linux_workstation | 6.0 | 6.0.x |
redhat / enterprise_linux_desktop | 5.0 | 5.0.x |