Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-02-15 | CVE-2017-2982 | Use After Free vulnerability in Adobe Flash Player and Flash Player Desktop Runtime Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable use after free vulnerability in a routine related to player shutdown. | 8.8 |
2017-02-15 | CVE-2017-2981 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 7.5 |
2017-02-15 | CVE-2017-2980 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 7.5 |
2017-02-15 | CVE-2017-2979 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 7.5 |
2017-02-15 | CVE-2017-2978 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 7.5 |
2017-02-15 | CVE-2017-2977 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 7.5 |
2017-02-15 | CVE-2017-2976 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 7.5 |
2017-02-15 | CVE-2017-2975 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 7.5 |
2017-02-15 | CVE-2017-2974 | Out-of-bounds Read vulnerability in Adobe Digital Editions Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. | 7.5 |
2017-02-14 | CVE-2017-5972 | Resource Exhaustion vulnerability in Linux Kernel The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. | 7.5 |