漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
漏洞信息
N/A
漏洞
N/A
漏洞
Adobe Flash Player对象处理远程代码执行漏洞
漏洞信息
Adobe Flash Player是一款非常流行的FLASH播放器。 Adobe Flash Player在对象类型的处理上存在远程代码执行漏洞,由于某个对象方法在被引用时没有正确识别对象的类型,导致远程攻击者可以利用此漏洞通过诱使用户访问包含恶意SWF文件的网页在用户系统上执行任意指令,从而完全控制受影响的系统。此漏洞可被用于执行挂马攻击,影响面和威胁程度都很高,需要引起用户高度重视。
漏洞信息
N/A
漏洞
N/A