Executive Summary
Summary | |
---|---|
Title | Update for Vulnerabilities in Adobe Flash Player in Internet Explorer |
Informations | |||
---|---|---|---|
Name | KB2755801 | First vendor Publication | 2012-09-21 |
Vendor | Microsoft | Last vendor Modification | 2014-04-08 |
Severity (Vendor) | N/A | Revision | 22 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft is announcing the availability of an update for Adobe Flash Player in Internet Explorer on all supported editions of Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10 and Internet Explorer 11. Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. You can disable attempts to instantiate Adobe Flash Player in Internet Explorer and other applications that honor the kill bit feature, such as Office 2007 and Office 2010, by setting the kill bit for the control in the registry. Warning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk. To set the kill bit for the control in the registry, perform the following steps: Note You must restart Internet Explorer for your changes to take effect. Impact of workaround. There is no impact as long as the object is not intended to be used in Internet Explorer. How to undo the workaround. Delete the registry keys that were added in implementing this workaround. Note The Group Policy MMC snap-in can be used to set policy for a machine, for an organizational unit, or for an entire domain. For more information about Group Policy, visit the following Microsoft Web sites: Group Policy Overview What is Group Policy Object Editor? Core Group Policy tools and settings To disable Adobe Flash Player in Internet Explorer through Group Policy, perform the following steps: Note This workaround does not prevent Flash from being invoked from other applications, such as Microsoft Office 2007 or Microsoft Office 2010. Note This workaround does not prevent Adobe Flash Player from running in Internet Explorer. Warning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk. For detailed steps that you can use to prevent a control from running in Internet Explorer, see Microsoft Knowledge Base Article 240797. Follow the steps in the article to create a Compatibility Flags value in the registry to prevent a COM object from being instantiated in Internet Explorer. To disable Adobe Flash Player in Office 2010 only, set the kill bit for the ActiveX control for Adobe Flash Player in the registry using the following steps: You can also apply it across domains by using Group Policy. For more information about Group Policy, see the TechNet article, Group Policy collection. To disable all ActiveX controls in Microsoft Office 2007 and Microsoft Office 2010, including Adobe Flash Player in Internet Explorer, perform the following steps: Impact of workaround. Office documents that use embedded ActiveX controls may not display as intended. How to undo the workaround. To re-enable ActiveX controls in Microsoft Office 2007 and Microsoft Office 2010, perform the following steps: You can help protect against exploitation of these vulnerabilities by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High. To raise the browsing security level in Internet Explorer, perform the following steps: Note If no slider is visible, click Default Level, and then move the slider to High. Note Setting the level to High may cause some websites to work incorrectly. If you have difficulty using a website after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High. Impact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many websites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone". Add sites that you trust to the Internet Explorer Trusted sites zone After you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted websites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone. To do this, perform the following steps: Note Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update. You can help protect against exploitation of these vulnerabilities by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, perform the following steps: Note Disabling Active Scripting in the Internet and Local intranet security zones may cause some websites to work incorrectly. If you have difficulty using a website after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly. Impact of workaround. There are side effects to prompting before running Active Scripting. Many websites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone". Add sites that you trust to the Internet Explorer Trusted sites zone After you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted websites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone. To do this, perform the following steps: Note Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update. Microsoft recommends that customers apply the current update immediately using update management software, or by checking for updates using the Microsoft Update service. Since the update is cumulative, only the current update will be offered. Customers do not need to install previous updates as a prerequisite for installing the current update. Note Updates for Windows RT and Windows RT 8.1 are available via Windows Update. Note Updates for Windows RT and Windows RT 8.1 are available via Windows Update. This advisory discusses the following software. What is the scope of the advisory? How could an attacker exploit these vulnerabilities? In a web-based attack scenario where the user is using Internet Explorer in the Windows 8-style UI, an attacker would first need to compromise a website already listed in the Compatibility View (CV) list. An attacker could then host a website that contains specially crafted Flash content designed to exploit any of these vulnerabilities through Internet Explorer and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by clicking a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email. For more information about Internet Explorer and the CV List, please see the MSDN Article, Developer Guidance for websites with content for Adobe Flash Player in Windows 8. If I don't use Internet Explorer, do I still need to apply the update? What does the update do? |
Original Source
Url : http://www.microsoft.com/technet/security/advisory/2755801.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
60 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
20 % | CWE-416 | Use After Free |
20 % | CWE-415 | Double Free |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20318 | |||
Oval ID: | oval:org.mitre.oval:def:20318 | ||
Title: | Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted SWF content | ||
Description: | Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted SWF content, as exploited in the wild in August 2012 with SWF content in a Word document. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2012-1535 | Version: | 10 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | Adobe Flash Player |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28471 | |||
Oval ID: | oval:org.mitre.oval:def:28471 | ||
Title: | Adobe Flash Player 14.x though 16.0.0.287 and 13.x through 13.0.0.262 can cause a crash and potentially allow an attacker to take control of the Windows platform | ||
Description: | Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | APSA15-01 CVE-2015-0311 | Version: | 7 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2008 R2 Microsoft Windows 7 Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows Server 2012 R2 Microsoft Windows 8.1 | Product(s): | Adobe Flash Player |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28602 | |||
Oval ID: | oval:org.mitre.oval:def:28602 | ||
Title: | Adobe Flash Player 14.x though 16.0.0.296 and 13.x through 13.0.0.264 could crash and potentially allow system takeover on the Windows platform | ||
Description: | Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2015, a different vulnerability than CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | APSB15-02 CVE-2015-0313 | Version: | 7 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2008 R2 Microsoft Windows 7 Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows Server 2012 R2 Microsoft Windows 8.1 | Product(s): | Adobe Flash Player |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28646 | |||
Oval ID: | oval:org.mitre.oval:def:28646 | ||
Title: | Adobe Flash Player 14.x though 16.0.0.257 and 13.x through 13.0.0.260 could be used to circumvent memory randomization mitigations on the Windows platform | ||
Description: | Double free vulnerability in Adobe Flash Player before 13.0.0.264 and 14.x through 16.x before 16.0.0.296 on Windows and OS X and before 11.2.202.440 on Linux allows attackers to execute arbitrary code via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | APSB15-02 CVE-2015-0312 | Version: | 7 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows XP Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2008 R2 Microsoft Windows 7 Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows Server 2012 R2 Microsoft Windows 8.1 | Product(s): | Adobe Flash Player |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Adobe Flash Player OpenType Font Integer Overflow | More info here |
ExploitDB Exploits
id | Description |
---|---|
2012-08-20 | Adobe Flash Player 11.3 Font Parsing Code Execution |
OpenVAS Exploits
Date | Description |
---|---|
2013-03-28 | Name : Adobe Air Multiple Vulnerabilities - December12 (Mac OS X) File : nvt/gb_adobe_air_mult_vuln_dec12_macosx.nasl |
2013-03-28 | Name : Adobe Air Multiple Vulnerabilities - December12 (Windows) File : nvt/gb_adobe_air_mult_vuln_dec12_win.nasl |
2012-12-14 | Name : Adobe Flash Player Multiple Vulnerabilities - December12 (Linux) File : nvt/gb_adobe_flash_player_mult_vuln_dec12_lin.nasl |
2012-12-14 | Name : Adobe Flash Player Multiple Vulnerabilities - December12 (Mac OS X) File : nvt/gb_adobe_prdts_mult_vuln_dec12_macosx.nasl |
2012-12-14 | Name : Adobe Flash Player Multiple Vulnerabilities - December12 (Windows) File : nvt/gb_adobe_prdts_mult_vuln_dec12_win.nasl |
2012-12-13 | Name : SuSE Update for flash-player openSUSE-SU-2012:0996-1 (flash-player) File : nvt/gb_suse_2012_0996_1.nasl |
2012-09-15 | Name : Gentoo Security Advisory GLSA 201209-01 (adobe-flash) File : nvt/glsa_201209_01.nasl |
2012-08-20 | Name : Adobe Flash Player Font Parsing Code Execution Vulnerability - (Linux) File : nvt/gb_adobe_flash_player_font_parsing_code_exec_vuln_lin.nasl |
2012-08-20 | Name : Adobe Flash Player Font Parsing Code Execution Vulnerability - (Mac OS X) File : nvt/gb_adobe_flash_player_font_parsing_code_exec_vuln_macosx.nasl |
2012-08-20 | Name : Adobe Flash Player Font Parsing Code Execution Vulnerability - (Windows) File : nvt/gb_adobe_flash_player_font_parsing_code_exec_vuln_win.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2019-05-07 | Adobe Flash Player PCRE control character denial of service attempt RuleID : 49656 - Revision : 1 - Type : FILE-FLASH |
2019-05-07 | Adobe Flash Player PCRE control character denial of service attempt RuleID : 49655 - Revision : 1 - Type : FILE-FLASH |
2019-05-07 | Adobe Flash Player PCRE control character denial of service attempt RuleID : 49654 - Revision : 1 - Type : FILE-FLASH |
2017-07-04 | Adobe Flash Player JSON stringify memory corruption attempt RuleID : 43048 - Revision : 3 - Type : FILE-FLASH |
2016-03-15 | Adobe Flash Player ByteArray domainMemory use after free attempt RuleID : 37628 - Revision : 3 - Type : FILE-FLASH |
2016-03-15 | Adobe Flash Player ByteArray domainMemory use after free attempt RuleID : 37627 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player SWF buffer overflow attempt RuleID : 36879 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player SWF buffer overflow attempt RuleID : 36878 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player ActionScript worker use after free attempt RuleID : 36510 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player ActionScript worker use after free attempt RuleID : 36509 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player ActionScript worker use after free attempt RuleID : 36508 - Revision : 4 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player ActionScript worker use after free attempt RuleID : 36507 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player Ovector out of bounds stack corruption attempt RuleID : 36399 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player Ovector out of bounds stack corruption attempt RuleID : 36398 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player ByteArray domainMemory use after free attempt RuleID : 36157 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player ByteArray domainMemory use after free attempt RuleID : 36156 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player ByteArray domainMemory use after free attempt RuleID : 36155 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash Player ByteArray domainMemory use after free attempt RuleID : 36154 - Revision : 3 - Type : FILE-FLASH |
2015-08-04 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 35049 - Revision : 3 - Type : FILE-FLASH |
2015-08-04 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 35048 - Revision : 4 - Type : FILE-FLASH |
2015-07-13 | Adobe Flash Player JSON stringify memory corruption attempt RuleID : 34797 - Revision : 2 - Type : FILE-FLASH |
2015-07-13 | Adobe Flash Player JSON stringify memory corruption attempt RuleID : 34796 - Revision : 3 - Type : FILE-FLASH |
2015-07-13 | Adobe Flash Player JSON stringify memory corruption attempt RuleID : 34795 - Revision : 3 - Type : FILE-FLASH |
2015-07-13 | Adobe Flash Player JSON stringify memory corruption attempt RuleID : 34794 - Revision : 3 - Type : FILE-FLASH |
2015-06-23 | Adobe Flash Player object type confusion attempt RuleID : 34478 - Revision : 2 - Type : FILE-FLASH |
2015-06-23 | Adobe Flash Player object type confusion attempt RuleID : 34477 - Revision : 3 - Type : FILE-FLASH |
2015-04-30 | Nuclear exploit kit obfuscated file download RuleID : 33983 - Revision : 5 - Type : EXPLOIT-KIT |
2015-04-30 | Nuclear exploit kit landing page detected RuleID : 33982 - Revision : 3 - Type : EXPLOIT-KIT |
2015-04-30 | Nuclear exploit kit flash file download RuleID : 33981 - Revision : 4 - Type : EXPLOIT-KIT |
2015-03-24 | Adobe Flash Player XMLsocket connect arbitrary code execution attempt RuleID : 33559 - Revision : 2 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player XMLsocket connect arbitrary code execution attempt RuleID : 33558 - Revision : 2 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player XMLsocket connect arbitrary code execution attempt RuleID : 33557 - Revision : 2 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player XMLsocket connect arbitrary code execution attempt RuleID : 33556 - Revision : 2 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player SWF use-after-free attempt RuleID : 33555 - Revision : 3 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player SWF use-after-free attempt RuleID : 33554 - Revision : 4 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player addHeader null pointer dereference attempt RuleID : 33552 - Revision : 3 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player addHeader null pointer dereference attempt RuleID : 33551 - Revision : 3 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player addHeader null pointer dereference attempt RuleID : 33550 - Revision : 3 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player addHeader null pointer dereference attempt RuleID : 33549 - Revision : 3 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player Compressed File object type confusion attempt RuleID : 33542 - Revision : 2 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player Compressed File object type confusion attempt RuleID : 33541 - Revision : 3 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player object type confusion attempt RuleID : 33540 - Revision : 4 - Type : FILE-FLASH |
2015-03-24 | Adobe Flash Player object type confusion attempt RuleID : 33539 - Revision : 4 - Type : FILE-FLASH |
2015-03-19 | Adobe Flash Player PCRE control character denial of service attempt RuleID : 33538 - Revision : 3 - Type : FILE-FLASH |
2015-03-19 | Adobe Flash Player PCRE control character - possible denial of service attempt RuleID : 33537 - Revision : 2 - Type : FILE-FLASH |
2015-03-19 | Adobe Flash Player PCRE control character denial of service attempt RuleID : 33536 - Revision : 3 - Type : FILE-FLASH |
2015-03-19 | Adobe Flash Player PCRE control character - possible denial of service attempt RuleID : 33535 - Revision : 2 - Type : FILE-FLASH |
2015-03-19 | Adobe Flash Player PCRE control character denial of service attempt RuleID : 33534 - Revision : 3 - Type : FILE-FLASH |
2015-03-19 | Adobe Flash Player PCRE control character denial of service attempt RuleID : 33533 - Revision : 3 - Type : FILE-FLASH |
2015-03-19 | Adobe Flash Player PCRE library out of bounds memory access attempt RuleID : 33530 - Revision : 2 - Type : FILE-FLASH |
2015-03-19 | Adobe Flash Player PCRE library out of bounds memory access attempt RuleID : 33529 - Revision : 2 - Type : FILE-FLASH |
2015-03-19 | Adobe Flash Player PCRE library out of bounds memory access attempt RuleID : 33528 - Revision : 2 - Type : FILE-FLASH |
2015-03-19 | Adobe Flash Player PCRE library out of bounds memory access attempt RuleID : 33527 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player SWF buffer overflow attempt RuleID : 33512 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player SWF buffer overflow attempt RuleID : 33511 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player SWF buffer overflow attempt RuleID : 33510 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player SWF buffer overflow attempt RuleID : 33509 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player out of scope newclass memory corruption attempt RuleID : 33508 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player out of scope newclass memory corruption attempt RuleID : 33507 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player out of scope newclass memory corruption attempt RuleID : 33506 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player out of scope newclass memory corruption attempt RuleID : 33505 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player MessageChannel use after free attempt RuleID : 33504 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player MessageChannel use after free attempt RuleID : 33503 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player MessageChannel use after free attempt RuleID : 33502 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player MessageChannel use after free attempt RuleID : 33501 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player extended BitmapFilter class denial of service attempt RuleID : 33500 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player extended BitmapFilter class denial of service attempt RuleID : 33499 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player extended BitmapFilter class denial of service attempt RuleID : 33498 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player extended BitmapFilter class denial of service attempt RuleID : 33497 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player Ovector out of bounds stack corruption attempt RuleID : 33491 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player Ovector out of bounds stack corruption attempt RuleID : 33490 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player Ovector out of bounds stack corruption attempt RuleID : 33489 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player Ovector out of bounds stack corruption attempt RuleID : 33488 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player URLRequestHeaders null pointer dereference denial of servi... RuleID : 33487 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player URLRequestHeaders null pointer dereference denial of servi... RuleID : 33486 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player URLRequestHeaders null pointer dereference denial of servi... RuleID : 33485 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player URLRequestHeaders null pointer dereference denial of servi... RuleID : 33484 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player byte array use after free attempt RuleID : 33478 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player byte array use after free attempt RuleID : 33477 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player byte array use after free attempt RuleID : 33476 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player byte array use after free attempt RuleID : 33475 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player MP4 malformed avc atom memory corruption attempt RuleID : 33474 - Revision : 3 - Type : FILE-MULTIMEDIA |
2015-03-17 | Adobe Flash Player MP4 malformed avc atom memory corruption attempt RuleID : 33473 - Revision : 2 - Type : FILE-MULTIMEDIA |
2015-03-17 | Adobe Flash Player arbitrary code execution attempt RuleID : 33472 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player arbitrary code execution attempt RuleID : 33471 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player PCRE regex compilation memory corruption attempt RuleID : 33470 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player PCRE regex compilation memory corruption attempt RuleID : 33469 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player heap overflow using special characters with regex options ... RuleID : 33468 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player heap overflow using special characters with regex options ... RuleID : 33467 - Revision : 3 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player heap overflow using special characters with regex options ... RuleID : 33466 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player heap overflow using special characters with regex options ... RuleID : 33465 - Revision : 2 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player ActionScript worker use after free attempt RuleID : 33463 - Revision : 6 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player ActionScript worker use after free attempt RuleID : 33462 - Revision : 5 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player ActionScript worker use after free attempt RuleID : 33461 - Revision : 7 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player ActionScript worker use after free attempt RuleID : 33460 - Revision : 5 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player ActionScript worker use after free attempt RuleID : 33459 - Revision : 4 - Type : FILE-FLASH |
2015-03-17 | Adobe Flash Player ActionScript worker use after free attempt RuleID : 33458 - Revision : 8 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33410 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33409 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33408 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33407 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33406 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33405 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33404 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33403 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33402 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33401 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33400 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33399 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33398 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33397 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33396 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33395 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33394 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33393 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33392 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33391 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33390 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33389 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33388 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33387 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33386 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33385 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33384 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33383 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33382 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33381 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33380 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33379 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33378 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33377 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33376 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33375 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33374 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33373 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33372 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33371 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33370 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33369 - Revision : 3 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33368 - Revision : 4 - Type : FILE-FLASH |
2015-03-12 | Adobe Flash Player ByteArray uncompress domainMemory use after free attempt RuleID : 33367 - Revision : 4 - Type : FILE-FLASH |
2015-03-04 | Angler exploit kit Adobe Flash SWF exploit download RuleID : 33274 - Revision : 2 - Type : EXPLOIT-KIT |
2015-03-04 | Angler exploit kit Adobe Flash SWF exploit download RuleID : 33273 - Revision : 2 - Type : EXPLOIT-KIT |
2015-03-04 | Angler exploit kit Adobe Flash SWF exploit download RuleID : 33272 - Revision : 2 - Type : EXPLOIT-KIT |
2015-03-04 | Angler exploit kit Adobe Flash SWF exploit download RuleID : 33271 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Adobe Flash OpenType font memory corruption attempt RuleID : 28708 - Revision : 6 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash OpenType font memory corruption attempt RuleID : 28707 - Revision : 6 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash OpenType font memory corruption attempt RuleID : 28706 - Revision : 6 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash OpenType font memory corruption attempt RuleID : 28705 - Revision : 6 - Type : FILE-FLASH |
2014-01-10 | Nailed exploit kit flash remote code execution exploit download - autopwn RuleID : 27082 - Revision : 2 - Type : EXPLOIT-KIT |
2014-01-10 | Adobe Flash OpenType font memory corruption attempt - compressed RuleID : 23967 - Revision : 10 - Type : FILE-FLASH |
2014-01-10 | Win.Trojan.C0D0SO0 variant outbound traffic RuleID : 23942 - Revision : 3 - Type : MALWARE-CNC |
2014-01-10 | DNS request for known malware domain publicnews.mooo.com - Backdoor.Briba RuleID : 23904 - Revision : 7 - Type : BLACKLIST |
2014-01-10 | Adobe Flash OpenType font memory corruption attempt RuleID : 23854 - Revision : 8 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash OpenType font memory corruption attempt RuleID : 23853 - Revision : 9 - Type : FILE-FLASH |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-07-09 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : smb_kb3065823.nasl - Type : ACT_GATHER_INFO |
2015-06-24 | Name : The remote Windows host has a browser plugin installed that is affected by a ... File : smb_kb3074219.nasl - Type : ACT_GATHER_INFO |
2015-06-09 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : smb_kb3065820.nasl - Type : ACT_GATHER_INFO |
2015-05-12 | Name : The remote Windows host has a browser plugin installed that is affected by mu... File : smb_kb3061904.nasl - Type : ACT_GATHER_INFO |
2015-04-16 | Name : The remote Windows host has a browser plugin that is affected by multiple vul... File : smb_kb3049508.nasl - Type : ACT_GATHER_INFO |
2015-03-13 | Name : The remote Windows host has a browser plugin that is affected by multiple vul... File : smb_kb3044132.nasl - Type : ACT_GATHER_INFO |
2015-02-09 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_flash-player-150206.nasl - Type : ACT_GATHER_INFO |
2015-02-09 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2015-0140.nasl - Type : ACT_GATHER_INFO |
2015-02-09 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-118.nasl - Type : ACT_GATHER_INFO |
2015-02-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201502-02.nasl - Type : ACT_GATHER_INFO |
2015-02-06 | Name : The remote Windows host has a browser plugin that is affected by multiple vul... File : smb_kb3021953.nasl - Type : ACT_GATHER_INFO |
2015-02-06 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_google_chrome_40_0_2214_111.nasl - Type : ACT_GATHER_INFO |
2015-02-06 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : google_chrome_40_0_2214_111.nasl - Type : ACT_GATHER_INFO |
2015-02-03 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_734bcd49aae611e4a0c1c485083ca99c.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote Mac OS X host has a browser plugin that is affected by multiple co... File : macosx_flash_player_apsa15-02.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote Windows host has a browser plugin that is affected by multiple cod... File : flash_player_apsa15-02.nasl - Type : ACT_GATHER_INFO |
2015-01-30 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-81.nasl - Type : ACT_GATHER_INFO |
2015-01-29 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_flash-player-150127.nasl - Type : ACT_GATHER_INFO |
2015-01-28 | Name : The remote Windows host has a browser plugin that is affected by multiple cod... File : smb_kb3035034.nasl - Type : ACT_GATHER_INFO |
2015-01-28 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2015-0094.nasl - Type : ACT_GATHER_INFO |
2015-01-28 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-78.nasl - Type : ACT_GATHER_INFO |
2015-01-27 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_google_chrome_40_0_2214_93.nasl - Type : ACT_GATHER_INFO |
2015-01-27 | Name : The remote Windows host contains a web browser that is affected by multiple r... File : google_chrome_40_0_2214_93.nasl - Type : ACT_GATHER_INFO |
2015-01-27 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_37a87adea59f11e4958e0011d823eebd.nasl - Type : ACT_GATHER_INFO |
2015-01-26 | Name : The remote Mac OS X host has a browser plugin that is affected by multiple co... File : macosx_flash_player_16_0_0_296.nasl - Type : ACT_GATHER_INFO |
2015-01-26 | Name : The remote Windows host has a browser plugin that is affected by multiple cod... File : flash_player_apsa15-01.nasl - Type : ACT_GATHER_INFO |
2015-01-23 | Name : The remote Windows host has a browser plugin that is affected by an informati... File : smb_kb3033408.nasl - Type : ACT_GATHER_INFO |
2015-01-13 | Name : The remote Windows host has a browser plugin that is affected by multiple vul... File : smb_kb3024663.nasl - Type : ACT_GATHER_INFO |
2014-12-09 | Name : The remote Windows host has a browser plugin that is affected by multiple vul... File : smb_kb3008925.nasl - Type : ACT_GATHER_INFO |
2014-11-25 | Name : The remote Windows host has a browser plugin that is affected by a remote cod... File : smb_kb3018943.nasl - Type : ACT_GATHER_INFO |
2014-11-12 | Name : The remote Windows host has a browser plugin that is affected by multiple vul... File : smb_kb3004150.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2012-518.nasl - Type : ACT_GATHER_INFO |
2014-04-08 | Name : The remote host has an ActiveX control installed that is affected by multiple... File : smb_kb2942844.nasl - Type : ACT_GATHER_INFO |
2014-03-12 | Name : The remote Windows host contains software that is affected by multiple vulner... File : hp_systems_insight_manager_72_multiple_vulns.nasl - Type : ACT_GATHER_INFO |
2014-03-11 | Name : The remote host has an ActiveX control installed that is affected by multiple... File : smb_kb2938527.nasl - Type : ACT_GATHER_INFO |
2014-02-20 | Name : The remote host has an ActiveX control installed that is affected by multiple... File : smb_kb2934802.nasl - Type : ACT_GATHER_INFO |
2014-02-04 | Name : The remote host has an ActiveX control installed that is affected by a remote... File : smb_kb2929825.nasl - Type : ACT_GATHER_INFO |
2014-01-14 | Name : The remote host has an ActiveX control installed that is affected by multiple... File : smb_kb2916626.nasl - Type : ACT_GATHER_INFO |
2013-12-11 | Name : The remote host has an ActiveX control installed that is affected by memory c... File : smb_kb2907997.nasl - Type : ACT_GATHER_INFO |
2013-11-13 | Name : The remote host has an ActiveX control installed that is affected by memory c... File : smb_kb2898108.nasl - Type : ACT_GATHER_INFO |
2013-09-11 | Name : The remote host has an ActiveX control installed that is affected by memory c... File : smb_kb2880289.nasl - Type : ACT_GATHER_INFO |
2013-07-10 | Name : The remote host has an ActiveX control installed that is affected by memory c... File : smb_kb2857645.nasl - Type : ACT_GATHER_INFO |
2013-06-11 | Name : The remote host has an ActiveX control installed that is affected by memory c... File : smb_kb2847928.nasl - Type : ACT_GATHER_INFO |
2013-05-15 | Name : The remote host has an ActiveX control installed that is potentially affected... File : smb_kb2837385.nasl - Type : ACT_GATHER_INFO |
2013-04-10 | Name : The remote host has an ActiveX control installed that is potentially affected... File : smb_kb2833510.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote host has an ActiveX control installed that is potentially affected... File : smb_kb2824670.nasl - Type : ACT_GATHER_INFO |
2013-02-27 | Name : The remote host has an ActiveX control installed that is potentially affected... File : smb_kb2819372.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_flash-player-120815.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2012-1203.nasl - Type : ACT_GATHER_INFO |
2013-01-09 | Name : The remote host has a vulnerable ActiveX control installed. File : smb_kb2796096.nasl - Type : ACT_GATHER_INFO |
2012-12-11 | Name : The remote host has an ActiveX control installed with multiple vulnerabilities. File : smb_kb2785605.nasl - Type : ACT_GATHER_INFO |
2012-10-10 | Name : The remote host has an ActiveX control installed with multiple vulnerabilities. File : smb_kb2758994.nasl - Type : ACT_GATHER_INFO |
2012-09-21 | Name : The remote host has an ActiveX control installed with multiple vulnerabilities. File : smb_kb2755399.nasl - Type : ACT_GATHER_INFO |
2012-09-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201209-01.nasl - Type : ACT_GATHER_INFO |
2012-08-20 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_flash-player-8249.nasl - Type : ACT_GATHER_INFO |
2012-08-16 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2012-1173.nasl - Type : ACT_GATHER_INFO |
2012-08-15 | Name : The remote Windows host has a browser plugin that is affected by a remote cod... File : flash_player_apsb12-18.nasl - Type : ACT_GATHER_INFO |
2012-08-15 | Name : The remote Mac OS X host has a browser plugin that is affected by a remote co... File : macosx_flash_player_11_3_300_271.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-27 01:31:44 |
|
2015-07-18 13:29:45 |
|
2015-06-25 13:28:33 |
|
2015-06-10 13:27:52 |
|
2015-05-13 13:28:06 |
|
2015-04-18 13:27:02 |
|
2015-03-11 13:25:04 |
|
2015-02-07 13:25:22 |
|
2015-01-29 13:24:23 |
|
2015-01-24 13:24:00 |
|
2015-01-14 13:23:35 |
|
2014-12-10 13:27:03 |
|
2014-11-26 13:28:28 |
|
2014-11-12 13:27:26 |
|
2014-04-09 13:22:25 |
|
2014-04-08 21:20:14 |
|
2014-03-12 13:21:31 |
|
2014-03-11 21:23:25 |
|
2014-02-21 13:21:11 |
|
2014-02-20 21:19:20 |
|
2014-02-17 11:38:41 |
|
2014-02-04 21:19:17 |
|
2013-12-14 21:19:30 |
|
2013-12-11 05:17:52 |
|
2013-11-12 21:19:20 |
|
2013-09-18 17:10:31 |
|
2013-06-11 21:18:17 |
|
2013-05-15 05:18:04 |
|
2013-02-27 00:19:33 |
|
2013-02-27 00:17:35 |
|
2013-02-12 21:22:09 |
|
2013-02-12 21:20:12 |
|
2013-02-08 00:24:55 |
|
2013-02-08 00:22:56 |
|
2013-01-08 21:22:37 |
|
2013-01-08 21:20:36 |
|
2012-12-11 21:21:38 |
|
2012-12-11 21:20:03 |
|