Max CVSS | 9.3 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2016-6932 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
31-01-2023 - 18:38 | 14-09-2016 - 18:59 | |
CVE-2016-6921 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
31-01-2023 - 18:38 | 14-09-2016 - 18:59 | |
CVE-2016-6930 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
31-01-2023 - 18:38 | 14-09-2016 - 18:59 | |
CVE-2016-6929 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
31-01-2023 - 18:38 | 14-09-2016 - 18:59 | |
CVE-2016-4279 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
31-01-2023 - 18:38 | 14-09-2016 - 18:59 | |
CVE-2016-6927 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
19-01-2023 - 03:21 | 14-09-2016 - 18:59 | |
CVE-2016-6926 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
19-01-2023 - 03:19 | 14-09-2016 - 18:59 | |
CVE-2016-6925 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
19-01-2023 - 03:15 | 14-09-2016 - 18:59 | |
CVE-2016-6923 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
19-01-2023 - 03:02 | 14-09-2016 - 18:59 | |
CVE-2016-4272 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
19-01-2023 - 03:01 | 14-09-2016 - 18:59 | |
CVE-2016-4278 | 4.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a diff
|
22-12-2022 - 20:24 | 14-09-2016 - 18:59 | |
CVE-2016-6931 | 9.3 |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerab
|
22-12-2022 - 20:17 | 14-09-2016 - 18:59 | |
CVE-2016-6922 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
14-11-2022 - 19:35 | 14-09-2016 - 18:59 | |
CVE-2016-4274 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
14-11-2022 - 19:34 | 14-09-2016 - 18:59 | |
CVE-2016-4271 | 4.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a diff
|
14-11-2022 - 19:34 | 14-09-2016 - 18:59 | |
CVE-2016-4276 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
14-11-2022 - 19:34 | 14-09-2016 - 18:59 | |
CVE-2016-4275 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
14-11-2022 - 19:34 | 14-09-2016 - 18:59 | |
CVE-2016-6924 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
10-11-2022 - 20:40 | 14-09-2016 - 18:59 | |
CVE-2016-4277 | 4.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a diff
|
10-11-2022 - 20:30 | 14-09-2016 - 18:59 | |
CVE-2016-4287 | 9.3 |
Integer overflow in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors.
|
10-11-2022 - 20:30 | 14-09-2016 - 18:59 | |
CVE-2016-4282 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
10-11-2022 - 20:27 | 14-09-2016 - 18:59 | |
CVE-2016-4281 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
10-11-2022 - 20:26 | 14-09-2016 - 18:59 | |
CVE-2016-4280 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
10-11-2022 - 20:26 | 14-09-2016 - 18:59 | |
CVE-2016-4285 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
10-11-2022 - 20:24 | 14-09-2016 - 18:59 | |
CVE-2016-4284 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
10-11-2022 - 20:18 | 14-09-2016 - 18:59 | |
CVE-2016-4283 | 9.3 |
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a d
|
10-11-2022 - 20:18 | 14-09-2016 - 18:59 |