Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
shockwave_player Vendor: adobe

About This Product

shockwave_player is a software product developed by adobe, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 174 known vulnerabilities affecting adobe shockwave_player. This includes 8 critical-severity issues and 163 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2005 to 2019, indicating a sustained research interest and ongoing security attention. 3 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2005-3525 2005-12-31 2025-04-03 - 9.3 Likely
CVE-2007-5275 2007-10-08 2025-04-09 - 5.0 Likely
CVE-2007-5941 2007-11-14 2025-04-09 - 10.0 Likely
CVE-2009-1860 2009-06-25 2025-04-09 - 9.3 Likely
CVE-2009-2186 2009-06-25 2025-04-09 - 9.3 Likely
CVE-2009-3244 2009-09-18 2025-04-09 - 9.3 Likely
CVE-2009-3463 2009-11-04 2025-04-09 - 9.3 Likely
CVE-2009-3464 2009-11-04 2025-04-09 - 9.3 Likely
CVE-2009-3465 2009-11-04 2025-04-09 - 9.3 Likely
CVE-2009-3466 2009-11-04 2025-04-09 - 9.3 Likely
CVE-2009-4002 2010-01-21 2025-04-11 - 9.3 Likely
CVE-2009-4003 2010-01-21 2025-04-11 - 9.3 Likely
CVE-2010-0127 2010-05-13 2025-04-11 8.8 9.3 Likely
CVE-2010-0128 2010-05-13 2025-04-11 - 9.3 Likely
CVE-2010-0129 2010-05-13 2025-04-11 8.8 9.3 Likely
CVE-2010-0130 2010-05-13 2025-04-11 8.8 9.3 Likely
CVE-2010-0986 2010-05-13 2025-04-11 8.8 9.3 Likely
CVE-2010-0987 2010-05-13 2025-04-11 8.8 9.3 Likely
CVE-2010-1280 2010-05-13 2025-04-11 8.8 9.3 Likely
CVE-2010-1281 2010-05-13 2025-04-11 8.8 9.3 Likely
CVE-2010-1282 2010-05-13 2025-04-11 6.5 4.3 Likely
CVE-2010-1283 2010-05-13 2025-04-11 8.8 9.3 Likely
CVE-2010-1292 2010-05-13 2025-04-11 - 9.3 Likely
CVE-2010-1284 2010-05-13 2025-04-11 - 9.3 Likely
CVE-2010-1286 2010-05-13 2025-04-11 - 9.3 Likely
CVE-2010-1287 2010-05-13 2025-04-11 - 9.3 Likely
CVE-2010-1288 2010-05-13 2025-04-11 - 9.3 Likely
CVE-2010-1289 2010-05-13 2025-04-11 - 9.3 Likely
CVE-2010-1290 2010-05-13 2025-04-11 - 9.3 Likely
CVE-2010-1291 2010-05-13 2025-04-11 - 9.3 Likely
CVE-2010-2863 2010-08-26 2025-04-11 - 10.0 Likely
CVE-2010-2864 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2865 2010-08-26 2025-04-11 - 5.0 Likely
CVE-2010-2866 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2867 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2868 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2869 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2870 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2871 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2872 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2873 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2875 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2876 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2877 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2878 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2879 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2880 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2881 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2882 2010-08-26 2025-04-11 - 9.3 Likely
CVE-2010-2874 2010-09-07 2025-04-11 - 9.3 Likely
CVE-2010-3653 2010-10-26 2025-04-11 - 9.3 Likely
CVE-2010-2581 2010-10-29 2025-04-11 - 9.3 Likely
CVE-2010-2582 2010-10-29 2025-04-11 - 9.3 Likely
CVE-2010-3655 2010-10-29 2025-04-11 - 9.3 Likely
CVE-2010-4084 2010-10-29 2025-04-11 - 9.3 Likely
CVE-2010-4085 2010-10-29 2025-04-11 - 9.3 Likely
CVE-2010-4086 2010-10-29 2025-04-11 - 9.3 Likely
CVE-2010-4087 2010-10-29 2025-04-11 - 9.3 Likely
CVE-2010-4088 2010-10-29 2025-04-11 - 9.3 Likely
CVE-2010-4089 2010-10-29 2025-04-11 - 9.3 Likely
CVE-2010-4090 2010-10-29 2025-04-11 - 9.3 Likely
CVE-2010-4092 2010-11-05 2025-04-11 - 9.3 Likely
CVE-2010-2587 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-2588 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-2589 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4093 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4187 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4188 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4189 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4190 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4191 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4192 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4193 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4194 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4195 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4196 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4306 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2010-4307 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2011-0555 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2011-0556 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2011-0557 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2011-0569 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2011-0317 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-0318 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-0319 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-0320 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-0335 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2108 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2109 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2111 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2112 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2113 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2114 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2115 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2116 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2117 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2118 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2119 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2120 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2121 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2122 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2123 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2124 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2125 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2126 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2127 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2011-2128 2011-06-16 2025-04-11 - 9.3 Likely
CVE-2010-4308 2011-08-11 2025-04-11 - 10.0 Likely
CVE-2010-4309 2011-08-11 2025-04-11 - 10.0 Likely
CVE-2011-2419 2011-08-11 2025-04-11 - 10.0 Likely
CVE-2011-2420 2011-08-11 2025-04-11 - 10.0 Likely
CVE-2011-2421 2011-08-11 2025-04-11 - 9.3 Likely
CVE-2011-2422 2011-08-11 2025-04-11 - 10.0 Likely
CVE-2011-2423 2011-08-11 2025-04-11 - 10.0 Likely
CVE-2011-2446 2011-11-08 2025-04-11 - 10.0 Likely
CVE-2011-2447 2011-11-08 2025-04-11 - 10.0 Likely
CVE-2011-2448 2011-11-08 2025-04-11 - 10.0 Likely
CVE-2011-2449 2011-11-08 2025-04-11 - 10.0 Likely
CVE-2012-0757 2012-02-15 2025-04-11 - 10.0 Likely
CVE-2012-0758 2012-02-15 2025-04-11 - 10.0 Likely
CVE-2012-0759 2012-02-15 2025-04-11 - 10.0 Likely
CVE-2012-0760 2012-02-15 2025-04-11 - 10.0 Likely
CVE-2012-0761 2012-02-15 2025-04-11 - 10.0 Likely
CVE-2012-0762 2012-02-15 2025-04-11 - 10.0 Likely
CVE-2012-0763 2012-02-15 2025-04-11 - 10.0 Likely
CVE-2012-0764 2012-02-15 2025-04-11 - 10.0 Likely
CVE-2012-0766 2012-02-15 2025-04-11 - 10.0 Likely
CVE-2012-2029 2012-05-09 2025-04-11 - 10.0 Likely
CVE-2012-2030 2012-05-09 2025-04-11 - 10.0 Likely
CVE-2012-2031 2012-05-09 2025-04-11 - 10.0 Likely
CVE-2012-2032 2012-05-09 2025-04-11 - 10.0 Likely
CVE-2012-2033 2012-05-09 2025-04-11 - 10.0 Likely
CVE-2012-2043 2012-08-15 2025-04-11 - 10.0 Likely
CVE-2012-2044 2012-08-15 2025-04-11 - 10.0 Likely
CVE-2012-2045 2012-08-15 2025-04-11 - 10.0 Likely
CVE-2012-2046 2012-08-15 2025-04-11 - 10.0 Likely
CVE-2012-2047 2012-08-15 2025-04-11 - 10.0 Likely
CVE-2012-4172 2012-10-23 2025-04-11 - 10.0 Likely
CVE-2012-4173 2012-10-23 2025-04-11 - 10.0 Likely
CVE-2012-4174 2012-10-23 2025-04-11 - 10.0 Likely
CVE-2012-4175 2012-10-23 2025-04-11 - 10.0 Likely
CVE-2012-4176 2012-10-23 2025-04-11 - 10.0 Likely
CVE-2012-5273 2012-10-23 2025-04-11 - 10.0 Likely
CVE-2012-6270 2012-12-20 2025-04-11 - 9.3 Likely
CVE-2012-6271 2012-12-20 2025-04-11 - 9.3 Likely
CVE-2013-0635 2013-02-13 2025-04-11 - 10.0 Likely
CVE-2013-0636 2013-02-13 2025-04-11 - 10.0 Likely
CVE-2013-1383 2013-04-10 2025-04-11 - 10.0 Likely
CVE-2013-1384 2013-04-10 2025-04-11 - 10.0 Likely
CVE-2013-1385 2013-04-10 2025-04-11 - 10.0 Likely
CVE-2013-1386 2013-04-10 2025-04-11 - 10.0 Likely
CVE-2013-3348 2013-07-10 2025-04-11 - 10.0 Likely
CVE-2013-3359 2013-09-12 2025-04-11 - 10.0 Likely
CVE-2013-3360 2013-09-12 2025-04-11 - 10.0 Likely
CVE-2013-5333 2013-12-11 2025-04-11 - 10.0 Likely
CVE-2013-5334 2013-12-11 2025-04-11 - 10.0 Likely
CVE-2014-0500 2014-02-12 2025-04-11 - 10.0 Likely
CVE-2014-0501 2014-02-12 2025-04-11 - 10.0 Likely
CVE-2014-0505 2014-03-14 2025-04-12 - 10.0 Likely
CVE-2015-5120 2015-07-14 2025-04-12 - 10.0 Likely
CVE-2015-5121 2015-07-14 2025-04-12 - 10.0 Likely
CVE-2015-6680 2015-09-09 2025-04-12 - 10.0 Likely
CVE-2015-6681 2015-09-09 2025-04-12 - 10.0 Likely
CVE-2015-7649 2015-10-28 2025-04-12 - 10.0 Likely
CVE-2017-2983 2017-03-14 2025-04-20 7.8 6.8 Likely
CVE-2017-3086 2017-06-20 2025-04-20 9.8 10.0 Likely
CVE-2012-0771 2018-02-19 2024-11-21 8.8 9.3 Likely
CVE-2019-7104 2019-05-23 2024-11-21 9.8 10.0 Likely
CVE-2019-7098 2019-05-23 2024-11-21 9.8 10.0 Likely
CVE-2019-7099 2019-05-23 2024-11-21 9.8 10.0 Likely
CVE-2019-7100 2019-05-23 2024-11-21 9.8 10.0 Likely
CVE-2019-7101 2019-05-23 2024-11-21 9.8 10.0 Likely
CVE-2019-7102 2019-05-23 2024-11-21 9.8 10.0 Likely
CVE-2019-7103 2019-05-23 2024-11-21 9.8 10.0 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for adobe shockwave_player by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.