Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2012-4176


Array index error in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors.


Security Impact Summary

CVE-2012-4176 is a security vulnerability that . Impacting 1 product from adobe organizations running these solutions should prioritize assessment and patching.

Historical Context

Documented in 2012, this vulnerability occurred amid the cloud computing expansion era, where traditional network perimeter security models were being reevaluated. Organizations were transitioning from isolated infrastructure to interconnected systems, creating new attack surfaces that vulnerabilities like this could exploit.


Published

2012-10-23T23:55:01.627

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 10.0 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application adobe shockwave_player ≤ 11.6.7.637 Yes
Application adobe shockwave_player 1.0 Yes
Application adobe shockwave_player 2.0 Yes
Application adobe shockwave_player 3.0 Yes
Application adobe shockwave_player 4.0 Yes
Application adobe shockwave_player 5.0 Yes
Application adobe shockwave_player 6.0 Yes
Application adobe shockwave_player 8.0 Yes
Application adobe shockwave_player 8.0.196 Yes
Application adobe shockwave_player 8.0.196a Yes
Application adobe shockwave_player 8.0.204 Yes
Application adobe shockwave_player 8.0.205 Yes
Application adobe shockwave_player 8.5.1 Yes
Application adobe shockwave_player 8.5.1.100 Yes
Application adobe shockwave_player 8.5.1.103 Yes
Application adobe shockwave_player 8.5.1.105 Yes
Application adobe shockwave_player 8.5.1.106 Yes
Application adobe shockwave_player 8.5.321 Yes
Application adobe shockwave_player 8.5.323 Yes
Application adobe shockwave_player 8.5.324 Yes
Application adobe shockwave_player 8.5.325 Yes
Application adobe shockwave_player 9.0.383 Yes
Application adobe shockwave_player 9.0.432 Yes
Application adobe shockwave_player 10.0.0.210 Yes
Application adobe shockwave_player 10.0.1.004 Yes
Application adobe shockwave_player 10.1.0.11 Yes
Application adobe shockwave_player 10.1.0.011 Yes
Application adobe shockwave_player 10.1.1.016 Yes
Application adobe shockwave_player 10.1.4.020 Yes
Application adobe shockwave_player 10.2.0.021 Yes
Application adobe shockwave_player 10.2.0.022 Yes
Application adobe shockwave_player 10.2.0.023 Yes
Application adobe shockwave_player 11.0.0.456 Yes
Application adobe shockwave_player 11.0.3.471 Yes
Application adobe shockwave_player 11.5.0.595 Yes
Application adobe shockwave_player 11.5.0.596 Yes
Application adobe shockwave_player 11.5.1.601 Yes
Application adobe shockwave_player 11.5.2.602 Yes
Application adobe shockwave_player 11.5.6.606 Yes
Application adobe shockwave_player 11.5.7.609 Yes
Application adobe shockwave_player 11.5.8.612 Yes
Application adobe shockwave_player 11.5.9.615 Yes
Application adobe shockwave_player 11.5.9.620 Yes
Application adobe shockwave_player 11.5.10.620 Yes
Application adobe shockwave_player 11.6.0.626 Yes
Application adobe shockwave_player 11.6.1.629 Yes
Application adobe shockwave_player 11.6.3.633 Yes
Application adobe shockwave_player 11.6.4.634 Yes
Application adobe shockwave_player 11.6.5.635 Yes
Application adobe shockwave_player 11.6.6.636 Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For adobe's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.