CVE-2018-4878
CVE Published | 2018-02-06 |
---|---|
Related CWE(s) | CWE-416: Use After Free |
Related Vendor(s) | adobe, redhat |
Related Product(s) | enterprise_linux_server, flash_player, enterprise_linux_workstation, enterprise_linux_desktop |
Exploitation Reported (CISA KEV) | 2021-11-03 |
CVSS 3 Base Score | 9.8 (CRITICAL) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | NETWORK |
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph
Threat Reports Related to CVE-2018-4878
Report
APT37 (REAPER) - The Overlooked North Korean Actor
This special report by FireEye discusses an investigation into APT37, a suspected North Korean cyber espionage group. According to the report, ...