Stay in touch

Get our research, blog and event invitations before everybody else!

Your data will stay confidential Private and Confidential

CVE-2012-1535: Adobe Flash Player Integer Overflow Vulnerability Analysis

Thursday, October 11, 2012 By

Vulnerabilities in Adobe Flash Player has been widely used by cyber criminals since 2006 to penetrate remote systems. During the month of August 2012 a widespread 0day was used to perform attacks by using Microsoft Word documents as the principal attack vector. This security publication explains the particulars of the CVE-2012-1535 security vulnerability in detail.


Authors: Brian Mariani, Senior Security Auditor, High-Tech Bridge
Frederic Bourla, Chief Security Specialist, High-Tech Bridge

Vulnerabilities in Adobe Flash Player has been widely used by cyber criminals since 2006 to penetrate remote systems.

During the month of August 2012 a widespread 0day was used to perform attacks by using Microsoft Word documents as the principal attack vector.

This security publication explains the particulars of the CVE-2012-1535 security vulnerability in detail.




User Comments
Add Comment

Free web and mobile apps discovery Try now >
Free interactive demo or quote Request Now >
High-Tech Bridge on Facebook High-Tech Bridge on Twitter High-Tech Bridge on LinkedIn High-Tech Bridge RSS Feeds Send by Email