Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Adobe
  4. Adobe AIR
  5. 20.0.0.233

Known Vulnerabilities in Adobe AIR 20.0.0.233 page 2

Show more ↓
27.0.0.124
27.0.0
22.0.0.153
21.0.0.215
21.0.0.198
21.0.0.176
20.0.0.260
20.0.0.233
20.0.0.204
18.0.0.180
18.0.0.144
17.0.0.172
17.0.0.144
15.0.0.356
15.0.0.252
15.0.0.249
14.0.0.179
14.0.0.178
14.0.0.137
14.0.0.110
13.0.0.111
13.0.0.83
4.0.0.1628
4.0.0.1390
3.9.0.1380
3.9.0.1210
3.9.0.1060
3.9.0.1030
3.8.0.910
3.8.0.870
3.7.0.2090
3.7.0.1860
3.7.0.1530
3.6.0.6090
3.6.0.597
3.5.0.1060
3.5.0.890
3.5.0.880
3.5.0.600
3.4.0.2710
3.4.0.2540
3.3.0.3670
3.2.0.2070
3.2.0.207
3.1.0.4880
3.1.0.488
3.1.0.485
3.0.0.4080
3.0.0.408
2.7.1.19610
2.7.1
2.7.0.19530
2.7.0.19480
2.7.0.1953
2.7.0.1948
2.7
2.6.19120
2.6.0.19140
2.6.0.19120
2.6
2.5.1.17730
2.5.0.16600
2.0.4
2.0.3.13070
2.0.3
2.0.2.12610
2.0.2
1.5.3.9130
1.5.3.9120
1.5.3
1.5.2
1.5.1.8210
1.5.1
1.5.0.7220
1.5
1.1.0.5790
1.1
1.0.4990
1.0.8.4990
1.0.1
1.x
1.0



Microsoft Security Update for Adobe Flash Player09 Feb, 2016
High Patched Public exploit Exploited
  • 1
  • 2


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Ulefone and Krüger&Matz smartphones found with dangerous preloaded app flaws
  • New cryptojacking campaign exploits DevOps servers via misconfigurations
  • Google rolls out emergency Chrome update to patch actively exploited flaw
  • Tech giants to launch public glossary to avoid confusion over hacking group codenames
  • Critical vBulletin vulnerability exploited in the wild
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.