This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote Mac OS X host has a browser plugin that is affected by
According to its version, the instance of Flash Player installed on
the remote Mac OS X host is 10.x equal to or earlier than 10.3.183.14
or 11.x equal to or earlier than 184.108.40.206. It is, therefore,
reportedly affected by several critical vulnerabilities :
- An unspecified memory corruption issue exists that could
lead to code execution. (CVE-2012-0754)
- An unspecified type confusion memory corruption
vulnerability exists that could lead to code execution.
- An MP4 parsing memory corruption issue exists that
could lead to code execution. (CVE-2012-0753)
- Multiple unspecified security bypass vulnerabilities
exist that could lead to code execution. (CVE-2012-0755,
- A universal cross-site scripting issue exists that could
be used to take actions on a user's behalf on any
website or webmail provider. (CVE-2012-0767)
See also :
Upgrade to Adobe Flash version 10.3.183.15 / 220.127.116.11 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: MacOS X Local Security Checks
Nessus Plugin ID: 58002 ()
Bugtraq ID: 520325203352034520355203652040
CVE ID: CVE-2012-0752CVE-2012-0753CVE-2012-0754CVE-2012-0755CVE-2012-0756CVE-2012-0767
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.