This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote Mac OS X host has a browser plugin that is affected by
According to its version, the instance of Flash Player installed on
the remote Mac OS X host is equal or prior to 126.96.36.199. It is,
therefore, affected by the following vulnerabilities :
- A use-after-free error exists that allows code
- An unspecified security bypass error exists.
- Multiple errors exist related to memory leaks that can
be used to bypass memory address randomization.
(CVE-2014-0540, CVE-2014-0542, CVE-2014-0543,
See also :
Upgrade to Adobe Flash Player version 188.8.131.52 or later.
Alternatively, Adobe has made version 184.108.40.206 available for those
installations that cannot be upgraded to 14.x.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: MacOS X Local Security Checks
Nessus Plugin ID: 77174 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now