Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2017-3106: Security updates available for Adobe Flash Player

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft CVE-2017-3106: Security updates available for Adobe Flash Player

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
08/08/2017
Created
07/25/2018
Added
08/08/2017
Modified
11/18/2021

Description

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS. These updates address a critical type confusion vulnerability that could lead to code execution and an important security bypass vulnerability that could lead to information disclosure.

Solution(s)

  • msft-kb4034662-01abf460-47eb-453f-8f58-496e02a4c517
  • msft-kb4034662-1433b4d4-bfee-48fd-b4ac-7036be2a6f9d
  • msft-kb4034662-247c126a-51b1-4fd7-a65c-195a0daf2547
  • msft-kb4034662-4cfa4b7e-26ce-415a-a682-aef57cd301c7
  • msft-kb4034662-6363c965-0b46-4bcb-89be-f6de26a7319c
  • msft-kb4034662-7e739f78-e270-4e96-a20b-bdded134c57c
  • msft-kb4034662-80ead6e1-cdf4-44ca-a404-493bdfda297a
  • msft-kb4034662-c2d40406-a158-4186-a859-e4c0052e2b56
  • msft-kb4034662-c486050a-397b-48fe-9dad-1a457f578428
  • msft-kb4034662-cf09fe45-4196-46bf-86d8-ca29a4f7e3c9
  • msft-kb4034662-d14d0e92-c73e-4e55-a2fc-69dcf8e8b266
  • msft-kb4034662-dff3fa07-6a19-4549-9f35-f97b131f0b87
  • msft-kb4034662-e65ac1d4-f5e1-4e0e-b5a7-775bb46c9051
  • msft-kb4034662-f08a670e-d202-4a11-8d22-1052171bd132
  • msft-kb4034662-f9bbfdf1-afe1-4df2-b2dd-8049b56c87f1

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;