Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the TextField class. Successful exploitation could lead to arbitrary code execution.
Recent assessments:
gwillcox-r7 at November 22, 2020 3:24am UTC reported:
Reported as exploited in the wild as part of Googleβs 2020 0day vulnerability spreadsheet they made available at <https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=1869060786>. Original tweet announcing this spreadsheet with the 2020 findings can be found at <https://twitter.com/maddiestone/status/1329837665378725888>
Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0
lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html
lists.opensuse.org/opensuse-updates/2016-12/msg00112.html
rhn.redhat.com/errata/RHSA-2016-2947.html
www.securityfocus.com/bid/94877
www.securitytracker.com/id/1037442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7892
docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154
helpx.adobe.com/security/products/flash-player/apsb16-39.html
security.gentoo.org/glsa/201701-17