Security Blog
April 24, 2018
April 12, 2018
April 10, 2018
News and press releases
April 10, 2018
January 30, 2018
January 29, 2018
January 9, 2018
CVE-2012-1535: Adobe Flash Player Integer Overflow Vulnerability Analysis
Thursday, October 11, 2012Vulnerabilities in Adobe Flash Player has been widely used by cyber criminals since 2006 to penetrate remote systems. During the month of August 2012 a widespread 0day was used to perform attacks by using Microsoft Word documents as the principal attack vector. This security publication explains the particulars of the CVE-2012-1535 security vulnerability in detail.
Authors: | Brian Mariani, Senior Security Auditor, High-Tech Bridge Frederic Bourla, Chief Security Specialist, High-Tech Bridge |
Vulnerabilities in Adobe Flash Player has been widely used by cyber criminals since 2006 to penetrate remote systems.
During the month of August 2012 a widespread 0day was used to perform attacks by using Microsoft Word documents as the principal attack vector.
This security publication explains the particulars of the CVE-2012-1535 security vulnerability in detail.
Previous Blog Posts:
The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security How to use PyDbg as a powerful multitasking debugger User Comments
Add Comment