| Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:* versions up to (including) 29.0.0.171
OR
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
| Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:* versions up to (including) 29.0.0.171
*cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:* versions up to (including) 29.0.0.171
OR
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* |
| Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:* versions up to (including) 29.0.0.171
OR
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
| Added |
CPE Configuration |
|
OR
*cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* |
| Added |
CVSS V2 |
|
(AV:N/AC:M/Au:N/C:P/I:N/A:N) |
| Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism |
| Added |
CVSS V3 |
|
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
| Added |
CWE |
|
CWE-190 |
| Changed |
Reference Type |
http://www.securityfocus.com/bid/104413 No Types Assigned |
http://www.securityfocus.com/bid/104413 Third Party Advisory, VDB Entry |
| Changed |
Reference Type |
http://www.securitytracker.com/id/1041058 No Types Assigned |
http://www.securitytracker.com/id/1041058 Third Party Advisory, VDB Entry |
| Changed |
Reference Type |
https://access.redhat.com/errata/RHSA-2018:1827 No Types Assigned |
https://access.redhat.com/errata/RHSA-2018:1827 Third Party Advisory |
| Changed |
Reference Type |
https://helpx.adobe.com/security/products/flash-player/apsb18-19.html No Types Assigned |
https://helpx.adobe.com/security/products/flash-player/apsb18-19.html Patch, Vendor Advisory |