Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2018-15983: Security updates available for Adobe Flash Player

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2018-15983: Security updates available for Adobe Flash Player

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
12/05/2018
Created
03/19/2019
Added
12/10/2018
Modified
11/18/2021

Description

Adobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS. These updates address one critical vulnerability in Adobe Flash Player and one important vulnerability in Adobe Flash Player installer. Successful exploitation could lead to Arbitrary Code Execution and privilege escalation in the context of the current user respectively. Adobe is aware of reports that an exploit for CVE-2018-15982 exists in the wild.

Solution(s)

  • msft-kb4471331-03dcc275-5841-4f1e-a7d8-ba3078509399
  • msft-kb4471331-1e45c416-bd3f-45b0-9dd6-6faacffe2218
  • msft-kb4471331-279e6259-17f6-40cf-85c0-c04403ecf2e3
  • msft-kb4471331-31848889-9670-4bff-a5c6-e8dce8f4a128
  • msft-kb4471331-38e4b9f9-9044-4d72-b555-41ff9d765a6b
  • msft-kb4471331-5163c4ee-00ca-4767-a281-13d8c2a8499b
  • msft-kb4471331-5ae157b9-d2e8-46a9-b193-450d0b9ee448
  • msft-kb4471331-7a6de76b-3197-40a8-9e65-c4f449af259d
  • msft-kb4471331-8e6f8a3a-33c5-4b83-845f-1c9fd560210f
  • msft-kb4471331-9c0d2470-e9c1-4337-8a0a-fdfe256f8dd7
  • msft-kb4471331-ab2f232f-1fd3-4935-9c18-eebcf69e5e42
  • msft-kb4471331-b8322acd-27df-42f7-97c7-b3b302f4b6b9
  • msft-kb4471331-db77553d-8e72-44ed-bb1a-ec01a3a3893d
  • msft-kb4471331-ed46c8c9-7744-4ade-894a-daa763afa10d
  • msft-kb4471331-ee315d13-8fd4-40d2-bbaf-db88f4f17118
  • msft-kb4471331-eede3d45-dcf1-494e-a8e8-8637009e3341
  • msft-kb4471331-f890d49a-1abd-460e-bd5d-260748277f23
  • msft-kb4471331-fb656e2b-6102-4878-84d1-983a0d34d023
  • msft-kb4471331-fbff137f-db34-4c48-9e3d-3e3e142396db
  • msft-kb4471331-fc09766f-93e4-4adc-ab64-390659a705cd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;