CVE-2006-0024

Multiple unspecified vulnerabilities in Adobe Flash Player 8.0.22.0 and earlier allow remote attackers to execute arbitrary code via a crafted SWF file.
References
Link Resource
http://docs.info.apple.com/article.html?artnum=307179
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
http://secunia.com/advisories/19198
http://secunia.com/advisories/19218 Patch Vendor Advisory
http://secunia.com/advisories/19259
http://secunia.com/advisories/19328
http://secunia.com/advisories/20045
http://secunia.com/advisories/20077
http://secunia.com/advisories/28136
http://securitytracker.com/id?1015770
http://www.gentoo.org/security/en/glsa/glsa-200603-20.xml
http://www.kb.cert.org/vuls/id/945060 US Government Resource
http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_15_flashplayer.html
http://www.opera.com/docs/changelogs/windows/854/
http://www.osvdb.org/23908
http://www.redhat.com/support/errata/RHSA-2006-0268.html Vendor Advisory
http://www.securityfocus.com/bid/17106
http://www.securityfocus.com/bid/17951
http://www.us-cert.gov/cas/techalerts/TA06-075A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA06-129A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA06-132A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-352A.html US Government Resource
http://www.vupen.com/english/advisories/2006/0952
http://www.vupen.com/english/advisories/2006/1262
http://www.vupen.com/english/advisories/2006/1744
http://www.vupen.com/english/advisories/2006/1779
http://www.vupen.com/english/advisories/2007/4238
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020
https://exchange.xforce.ibmcloud.com/vulnerabilities/25005
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1894
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1922
http://docs.info.apple.com/article.html?artnum=307179
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
http://secunia.com/advisories/19198
http://secunia.com/advisories/19218 Patch Vendor Advisory
http://secunia.com/advisories/19259
http://secunia.com/advisories/19328
http://secunia.com/advisories/20045
http://secunia.com/advisories/20077
http://secunia.com/advisories/28136
http://securitytracker.com/id?1015770
http://www.gentoo.org/security/en/glsa/glsa-200603-20.xml
http://www.kb.cert.org/vuls/id/945060 US Government Resource
http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_15_flashplayer.html
http://www.opera.com/docs/changelogs/windows/854/
http://www.osvdb.org/23908
http://www.redhat.com/support/errata/RHSA-2006-0268.html Vendor Advisory
http://www.securityfocus.com/bid/17106
http://www.securityfocus.com/bid/17951
http://www.us-cert.gov/cas/techalerts/TA06-075A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA06-129A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA06-132A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-352A.html US Government Resource
http://www.vupen.com/english/advisories/2006/0952
http://www.vupen.com/english/advisories/2006/1262
http://www.vupen.com/english/advisories/2006/1744
http://www.vupen.com/english/advisories/2006/1779
http://www.vupen.com/english/advisories/2007/4238
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020
https://exchange.xforce.ibmcloud.com/vulnerabilities/25005
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1894
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1922
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:macromedia:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:4.0_r12:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0_r50:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:7.0.19.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:7.0.60.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:7.0.61.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:7.0_r19:*:*:*:*:*:*:*

History

21 Nov 2024, 00:05

Type Values Removed Values Added
References () http://docs.info.apple.com/article.html?artnum=307179 - () http://docs.info.apple.com/article.html?artnum=307179 -
References () http://lists.apple.com/archives/security-announce/2006/May/msg00003.html - () http://lists.apple.com/archives/security-announce/2006/May/msg00003.html -
References () http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html - () http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html -
References () http://secunia.com/advisories/19198 - () http://secunia.com/advisories/19198 -
References () http://secunia.com/advisories/19218 - Patch, Vendor Advisory () http://secunia.com/advisories/19218 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19259 - () http://secunia.com/advisories/19259 -
References () http://secunia.com/advisories/19328 - () http://secunia.com/advisories/19328 -
References () http://secunia.com/advisories/20045 - () http://secunia.com/advisories/20045 -
References () http://secunia.com/advisories/20077 - () http://secunia.com/advisories/20077 -
References () http://secunia.com/advisories/28136 - () http://secunia.com/advisories/28136 -
References () http://securitytracker.com/id?1015770 - () http://securitytracker.com/id?1015770 -
References () http://www.gentoo.org/security/en/glsa/glsa-200603-20.xml - () http://www.gentoo.org/security/en/glsa/glsa-200603-20.xml -
References () http://www.kb.cert.org/vuls/id/945060 - US Government Resource () http://www.kb.cert.org/vuls/id/945060 - US Government Resource
References () http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html - Patch, Vendor Advisory () http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html - Patch, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2006_15_flashplayer.html - () http://www.novell.com/linux/security/advisories/2006_15_flashplayer.html -
References () http://www.opera.com/docs/changelogs/windows/854/ - () http://www.opera.com/docs/changelogs/windows/854/ -
References () http://www.osvdb.org/23908 - () http://www.osvdb.org/23908 -
References () http://www.redhat.com/support/errata/RHSA-2006-0268.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0268.html - Vendor Advisory
References () http://www.securityfocus.com/bid/17106 - () http://www.securityfocus.com/bid/17106 -
References () http://www.securityfocus.com/bid/17951 - () http://www.securityfocus.com/bid/17951 -
References () http://www.us-cert.gov/cas/techalerts/TA06-075A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-075A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA06-129A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-129A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA06-132A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-132A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA07-352A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-352A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/0952 - () http://www.vupen.com/english/advisories/2006/0952 -
References () http://www.vupen.com/english/advisories/2006/1262 - () http://www.vupen.com/english/advisories/2006/1262 -
References () http://www.vupen.com/english/advisories/2006/1744 - () http://www.vupen.com/english/advisories/2006/1744 -
References () http://www.vupen.com/english/advisories/2006/1779 - () http://www.vupen.com/english/advisories/2006/1779 -
References () http://www.vupen.com/english/advisories/2007/4238 - () http://www.vupen.com/english/advisories/2007/4238 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25005 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25005 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1894 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1894 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1922 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1922 -

Information

Published : 2006-03-15 16:06

Updated : 2024-11-21 00:05


NVD link : CVE-2006-0024

Mitre link : CVE-2006-0024

CVE.ORG link : CVE-2006-0024


JSON object : View

Products Affected

macromedia

  • flash_player