CVE-2011-0575

Description

Untrusted search path vulnerability in Adobe Flash Player before 10.2.152.26 allows local users to gain privileges via a Trojan horse DLL in the current working directory.

6.9
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 0.14%
Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory opensuse.org Vendor Advisory redhat.com Vendor Advisory adobe.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.vupen.com/english/advisories/2011/0348 vdb entry
http://www.securitytracker.com/id?1025055 vdb entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/65238 vdb entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16127 vdb entry signature
http://www.vupen.com/english/advisories/2011/0646 vdb entry
http://secunia.com/advisories/43267 third party advisory
http://secunia.com/advisories/43292 third party advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14095 vdb entry signature
http://www.securityfocus.com/archive/1/516398/100/0/threaded mailing list
http://secunia.com/advisories/43351 third party advisory
http://secunia.com/advisories/43340 third party advisory
http://www.vupen.com/english/advisories/2011/0383 vdb entry
http://www.securityfocus.com/bid/46197 vdb entry
http://www.adobe.com/support/security/bulletins/apsb11-02.html patch vendor advisory
http://osvdb.org/70919 vdb entry
http://secunia.com/advisories/43747 third party advisory
http://www.vupen.com/english/advisories/2011/0402 vdb entry
http://www.redhat.com/support/errata/RHSA-2011-0259.html vendor advisory
http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash2
http://www.redhat.com/support/errata/RHSA-2011-0206.html vendor advisory
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00003.html vendor advisory
http://www.redhat.com/support/errata/RHSA-2011-0368.html vendor advisory

Frequently Asked Questions

What is the severity of CVE-2011-0575?
CVE-2011-0575 has been scored as a medium severity vulnerability.
How to fix CVE-2011-0575?
To fix CVE-2011-0575, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2011-0575 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2011-0575 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.