var-201211-0401
Vulnerability from variot
Unspecified vulnerability in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 has unknown impact and attack vectors. Adobe Flash Player and Adobe AIR Contains vulnerabilities that are unspecified.It may be affected unspecified. The impact of this issue is currently unknown. We will update this BID when more information emerges. The product enables viewing of applications, content and video across screens and browsers. Attackers exploit this vulnerability with unknown impact and attack vectors
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201211-0401", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "flash player", "scope": "gte", "trust": 1.0, "vendor": "adobe", "version": "11.2" }, { "model": "flash player", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "11.4.402.287" }, { "model": "flash player", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "10.3.183.29" }, { "model": "flash player", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "11.2.202.243" }, { "model": "air sdk", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "3.4.0.2710" }, { "model": "flash player", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "11.1.115.20" }, { "model": "flash player", "scope": "gte", "trust": 1.0, "vendor": "adobe", "version": "11.4" }, { "model": "air", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "3.4.0.2710" }, { "model": "flash player", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "11.1.111.19" }, { "model": "flash player", "scope": "gte", "trust": 1.0, "vendor": "adobe", "version": "11.1" }, { "model": "flash player", "scope": "gte", "trust": 1.0, "vendor": "adobe", "version": "10.3" }, { "model": "windows", "scope": "lt", "trust": 0.8, "vendor": "microsoft", "version": ")" }, { "model": "air", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "android)" }, { "model": "air", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "macintosh" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "(android 2.x 3.x)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "(android 4.x)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "11.x (linux)" }, { "model": "windows 8", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for 64-bit systems (adobe flash player 11.3.375.10" }, { "model": "air", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "(windows" }, { "model": "flash player", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "11.1.111.19" }, { "model": "internet explorer", "scope": "lt", "trust": 0.8, "vendor": "microsoft", "version": ")" }, { "model": "air sdk", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "(air for ios include )" }, { "model": "flash player", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "11.2.202.243" }, { "model": "windows 8", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for 32-bit systems (adobe flash player 11.3.375.10" }, { "model": "flash player", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "11.4.402.287" }, { "model": "windows server", "scope": "lt", "trust": 0.8, "vendor": "microsoft", "version": ")" }, { "model": "flash player", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "10.3.183.29" }, { "model": "chrome", "scope": "lt", "trust": 0.8, "vendor": "google", "version": "22.0.1229.92" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "11.x (windows macintosh)" }, { "model": "air", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "3.4.0.2710" }, { "model": "flash player", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "11.1.115.20" }, { "model": "windows 8", "scope": "lt", "trust": 0.8, "vendor": "microsoft", "version": ")" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "(linux)" }, { "model": "air sdk", "scope": "eq", "trust": 0.8, "vendor": "adobe", "version": "3.4.0.2710" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "(windows macintosh)" }, { "model": "windows server", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "2012 (adobe flash player 11.3.375.10" }, { "model": "internet explorer", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "10 (adobe flash player 11.3.375.10" }, { "model": "windows", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "rt (adobe flash player 11.3.375.10" }, { "model": "flash player", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "10.3.183.7" }, { "model": "flash player", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "10.3.183.15" }, { "model": "flash player", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "10.3.183.5" }, { "model": "flash player", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "10.3.183.20" }, { "model": "flash player", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "10.3.183.11" }, { "model": "flash player", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "10.3.183.18" }, { "model": "flash player", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "10.3.183.10" }, { "model": "flash player", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "10.3.181.34" }, { "model": "flash player", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "10.3.183.23" }, { "model": "flash player", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "10.3.183.16" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-005332" }, { "db": "CNNVD", "id": "CNNVD-201211-096" }, { "db": "NVD", "id": "CVE-2012-5673" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:google:chrome", "vulnerable": true }, { "cpe22Uri": "cpe:/a:adobe:adobe_air", "vulnerable": true }, { "cpe22Uri": "cpe:/a:adobe:adobe_air_sdk", "vulnerable": true }, { "cpe22Uri": "cpe:/a:adobe:flash_player", "vulnerable": true }, { "cpe22Uri": "cpe:/a:microsoft:internet_explorer", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_8", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-005332" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mateusz Jurczyk, Gynvael Coldwind and Fermin Serna of the Google Security Team", "sources": [ { "db": "BID", "id": "56377" }, { "db": "CNNVD", "id": "CNNVD-201211-096" } ], "trust": 0.9 }, "cve": "CVE-2012-5673", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2012-5673", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-58954", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-5673", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-5673", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201211-096", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-58954", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-58954" }, { "db": "JVNDB", "id": "JVNDB-2012-005332" }, { "db": "CNNVD", "id": "CNNVD-201211-096" }, { "db": "NVD", "id": "CVE-2012-5673" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 has unknown impact and attack vectors. Adobe Flash Player and Adobe AIR Contains vulnerabilities that are unspecified.It may be affected unspecified. \nThe impact of this issue is currently unknown. We will update this BID when more information emerges. The product enables viewing of applications, content and video across screens and browsers. Attackers exploit this vulnerability with unknown impact and attack vectors", "sources": [ { "db": "NVD", "id": "CVE-2012-5673" }, { "db": "JVNDB", "id": "JVNDB-2012-005332" }, { "db": "BID", "id": "56377" }, { "db": "VULHUB", "id": "VHN-58954" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-5673", "trust": 2.8 }, { "db": "BID", "id": "56377", "trust": 2.0 }, { "db": "OSVDB", "id": "86877", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-005332", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201211-096", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-58954", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-58954" }, { "db": "BID", "id": "56377" }, { "db": "JVNDB", "id": "JVNDB-2012-005332" }, { "db": "CNNVD", "id": "CNNVD-201211-096" }, { "db": "NVD", "id": "CVE-2012-5673" } ] }, "id": "VAR-201211-0401", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-58954" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:21:24.325000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APSB12-22", "trust": 0.8, "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "title": "APSB12-22", "trust": 0.8, "url": "http://www.adobe.com/jp/support/security/bulletins/apsb12-22.html" }, { "title": "Google Chrome", "trust": 0.8, "url": "http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja\u0026hl=ja" }, { "title": "Stable Channel Update", "trust": 0.8, "url": "http://googlechromereleases.blogspot.jp/2012/10/stable-channel-update.html" }, { "title": "Update for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 (2755801)", "trust": 0.8, "url": "http://technet.microsoft.com/en-us/security/advisory/2755801" }, { "title": "Internet Explorer 10 \u4e0a\u306e Adobe Flash Player \u306e\u8106\u5f31\u6027\u7528\u306e\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0 (2755801)", "trust": 0.8, "url": "http://technet.microsoft.com/ja-jp/security/advisory/2755801" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-005332" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2012-5673" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/56377" }, { "trust": 1.7, "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "trust": 1.1, "url": "http://osvdb.org/86877" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79773" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5673" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/vul/20121009-adobeflashplayer.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2012/at120031.txt" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5673" }, { "trust": 0.8, "url": "http://www.npa.go.jp/cyberpolice/#topics" }, { "trust": 0.3, "url": "http://www.adobe.com/products/air/" }, { "trust": 0.3, "url": "http://www.adobe.com/products/flash/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-58954" }, { "db": "BID", "id": "56377" }, { "db": "JVNDB", "id": "JVNDB-2012-005332" }, { "db": "CNNVD", "id": "CNNVD-201211-096" }, { "db": "NVD", "id": "CVE-2012-5673" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-58954" }, { "db": "BID", "id": "56377" }, { "db": "JVNDB", "id": "JVNDB-2012-005332" }, { "db": "CNNVD", "id": "CNNVD-201211-096" }, { "db": "NVD", "id": "CVE-2012-5673" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-11-13T00:00:00", "db": "VULHUB", "id": "VHN-58954" }, { "date": "2012-11-02T00:00:00", "db": "BID", "id": "56377" }, { "date": "2012-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-005332" }, { "date": "2012-11-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201211-096" }, { "date": "2012-11-13T13:39:47.217000", "db": "NVD", "id": "CVE-2012-5673" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-12-04T00:00:00", "db": "VULHUB", "id": "VHN-58954" }, { "date": "2013-06-20T09:38:00", "db": "BID", "id": "56377" }, { "date": "2012-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-005332" }, { "date": "2012-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201211-096" }, { "date": "2018-12-04T17:58:43.410000", "db": "NVD", "id": "CVE-2012-5673" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201211-096" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Flash Player and Adobe AIR Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-005332" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201211-096" } ], "trust": 0.6 } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.