Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-0609

KEV EPSS 92.08% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-0609

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Adobe Flash Player/Reader/Acrobat SWF文件内存破坏漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。Adobe Reader和Acrobat都是美国奥多比(Adobe)公司的产品。Adobe Reader是一款免费的PDF文件阅读器,Acrobat是一款PDF文件编辑和转换工具。 Adobe Flash Player,Reader和Acrobat中存在内存破坏漏洞。远程攻击者可借助特制Flash内容(作为电子邮件附件传送的Microsoft Ex
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2011-0609

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-0609

登录查看更多情报信息。

Same Patch Batch · n/a · 2011-03-15 · 11 CVEs total

CVE-2010-4757e107 submitnews.php跨站脚本攻击漏洞
CVE-2011-0001Open-iSCSI targetcli-fb 资源管理错误漏洞
CVE-2011-0063Majordomo 2 lib/Majordomo.pm _list_file_get函数路径遍历漏洞
CVE-2011-0438Arthur de Jong nss-pam-ldapd nslcd/pam.c认证绕过漏洞
CVE-2011-0457e107跨站脚本攻击漏洞
CVE-2011-0695Linux kernel InfiniBand驱动程序cm_work_handler函数竞争条件漏洞
CVE-2011-1092PHP 'shmop_read()'整数溢出漏洞
CVE-2011-1146Red Hat libvirt API libvirt.c拒绝服务漏洞
CVE-2011-1147Digium Asterisk UDPTL缓冲区溢出漏洞
CVE-2011-1427Kodak InSite多个跨站脚本攻击漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2011-0609

No comments yet


Leave a comment