Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Adobe
  4. Shockwave Player
  5. 12.1.8.158

Known Vulnerabilities in Shockwave Player 12.1.8.158

Show more ↓
12.3.5.205
12.3.4.204
12.3.1.201
12.2.9.199
12.2.8.198
12.2.7.197
12.2.1.171
12.2.0.162
12.1.9.160
12.1.9.159
12.1.8.158
12.1.0.150
12.0.9.149
12.0.7.148
12.0.6.147
12.0.4.144
12.0.3.133
12.0.2.122
12.0.0.112
11.6.8.638
11.6.7.637
11.6.6.636
11.6.5.635
11.6.4.634
11.6.3.633
11.6.1.629
11.6.0.626
11.5.10.620
11.5.9.620
11.5.9.615
11.5.8.612
11.5.7.609
11.5.6.606
11.5.2.602
11.5.1.601
11.5.0.596
11.5.0.595
11.0.3.471
11.0.0.456
11
10.2.0.023
10.2.0.022
10.2.0.021
10.1.4.020
10.1.1.016
10.1.0.11
10.1.0.011
10.0.1.004
10.0.0.210
9.0.432
9.0.383
9
8.5.325
8.5.324
8.5.323
8.5.321
8.5.1.106
8.5.1.105
8.5.1.103
8.5.1.100
8.5.1
8.0.205
8.0.204
8.0.196a
8.0.196
8.0
6.0
5.0
4.0
3.0
2.0
1.0



Multiple vulnerabilities in Adobe Shockwave Player10 Apr, 2019
High Patched
Remote code execution in Adobe Shockwave Player14 Nov, 2017
High Patched
Remote code execution in Adobe Shockwave Player13 Jun, 2017
High Patched
Insecure DLL library loading Adobe Shockwave Player14 Mar, 2017
High Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Russian GRU hackers accused of massive espionage campaign across NATO and allied nations
  • Chinese-speaking threat actors exploit Cityworks zero-day to hack into US govt agencies
  • Infamous Lumma stealer malware disrupted in global takedown
  • Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware
  • 100+ websites lured victims into downloading malicious Chrome extensions
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.