Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Adobe
  4. Adobe AIR
  5. 14.0.0.179

Known Vulnerabilities in Adobe AIR 14.0.0.179

Show more ↓
27.0.0.124
27.0.0
22.0.0.153
21.0.0.215
21.0.0.198
21.0.0.176
20.0.0.260
20.0.0.233
20.0.0.204
18.0.0.180
18.0.0.144
17.0.0.172
17.0.0.144
15.0.0.356
15.0.0.252
15.0.0.249
14.0.0.179
14.0.0.178
14.0.0.137
14.0.0.110
13.0.0.111
13.0.0.83
4.0.0.1628
4.0.0.1390
3.9.0.1380
3.9.0.1210
3.9.0.1060
3.9.0.1030
3.8.0.910
3.8.0.870
3.7.0.2090
3.7.0.1860
3.7.0.1530
3.6.0.6090
3.6.0.597
3.5.0.1060
3.5.0.890
3.5.0.880
3.5.0.600
3.4.0.2710
3.4.0.2540
3.3.0.3670
3.2.0.2070
3.2.0.207
3.1.0.4880
3.1.0.488
3.1.0.485
3.0.0.4080
3.0.0.408
2.7.1.19610
2.7.1
2.7.0.19530
2.7.0.19480
2.7.0.1953
2.7.0.1948
2.7
2.6.19120
2.6.0.19140
2.6.0.19120
2.6
2.5.1.17730
2.5.0.16600
2.0.4
2.0.3.13070
2.0.3
2.0.2.12610
2.0.2
1.5.3.9130
1.5.3.9120
1.5.3
1.5.2
1.5.1.8210
1.5.1
1.5.0.7220
1.5
1.1.0.5790
1.1
1.0.4990
1.0.8.4990
1.0.1
1.x
1.0



Multiple vulnerabilities in Adobe Flash Player14 Apr, 2015
Critical Patched Zero Day Public exploit


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Four arrested over cyberattacks targeting major UK retailers, including M&S
  • Initial access broker exploits leaked machine keys to access targeted orgs
  • AI voice impersonator posed as US Secretary of State Marco Rubio to contact foreign ministers
  • DoNot APT targets European foreign affairs ministry in espionage campaign
  • Microsoft fixes over 130 flaws, no actively exploited zero-days
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.