Vulnerability Details : CVE-2006-0024
Multiple unspecified vulnerabilities in Adobe Flash Player 8.0.22.0 and earlier allow remote attackers to execute arbitrary code via a crafted SWF file.
Vulnerability category: Execute code
Products affected by CVE-2006-0024
- cpe:2.3:a:macromedia:flash_player:*:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:4.0_r12:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:5.0_r50:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:7.0.19.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:7.0_r19:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:7.0.60.0:*:*:*:*:*:*:*
- cpe:2.3:a:macromedia:flash_player:7.0.61.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-0024
50.92%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-0024
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2006-0024
-
http://www.us-cert.gov/cas/techalerts/TA06-075A.html
US Government Resource
-
http://www.vupen.com/english/advisories/2006/1779
Site en construction
-
http://www.vupen.com/english/advisories/2007/4238
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://docs.info.apple.com/article.html?artnum=307179
-
http://www.vupen.com/english/advisories/2006/0952
-
http://www.securityfocus.com/bid/17951
-
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
Page Not Found | CISAUS Government Resource
-
http://www.us-cert.gov/cas/techalerts/TA06-129A.html
US Government Resource
-
http://www.gentoo.org/security/en/glsa/glsa-200603-20.xml
-
http://www.us-cert.gov/cas/techalerts/TA06-132A.html
Page Not Found | CISAUS Government Resource
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020
-
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
-
http://www.novell.com/linux/security/advisories/2006_15_flashplayer.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1922
-
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
Apple - Lists.apple.com
-
http://www.vupen.com/english/advisories/2006/1744
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1894
-
http://www.opera.com/docs/changelogs/windows/854/
-
http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html
Patch;Vendor Advisory
-
http://securitytracker.com/id?1015770
-
http://www.redhat.com/support/errata/RHSA-2006-0268.html
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25005
-
http://www.securityfocus.com/bid/17106
-
http://www.vupen.com/english/advisories/2006/1262
-
http://www.kb.cert.org/vuls/id/945060
US Government Resource
Jump to