Search criteria
39 vulnerabilities found for adobe_air_sdk_and_compiler by adobe
FKIE_CVE-2015-0309
Vulnerability from fkie_nvd - Published: 2015-01-13 23:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | adobe_air | * | |
| adobe | adobe_air_sdk_and_compiler | * | |
| adobe | flash_player | * | |
| adobe | flash_player | 14.0.0.125 | |
| adobe | flash_player | 14.0.0.145 | |
| adobe | flash_player | 14.0.0.176 | |
| adobe | flash_player | 14.0.0.179 | |
| adobe | flash_player | 15.0.0.144 | |
| adobe | flash_player | 15.0.0.152 | |
| adobe | flash_player | 15.0.0.167 | |
| adobe | flash_player | 15.0.0.189 | |
| adobe | flash_player | 15.0.0.223 | |
| adobe | flash_player | 15.0.0.238 | |
| adobe | flash_player | 15.0.0.239 | |
| adobe | flash_player | 15.0.0.246 | |
| adobe | flash_player | 16.0.0.234 | |
| adobe | flash_player | 16.0.0.235 | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | flash_player | 11.2.202.425 | |
| linux | linux_kernel | * | |
| adobe | adobe_air | * | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | adobe_air_sdk | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90",
"versionEndIncluding": "13.0.0.259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*",
"matchCriteriaId": "B75E16B2-A24F-4E90-AA3F-F0A9114B5C85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304."
},
{
"lang": "es",
"value": "Desbordamiento de buffer en memoria en Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2015-0304"
}
],
"id": "CVE-2015-0309",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-13T23:59:07.883",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "psirt@adobe.com",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/72038"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/72038"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-0307
Vulnerability from fkie_nvd - Published: 2015-01-13 23:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | adobe_air | * | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | flash_player | * | |
| linux | linux_kernel | * | |
| adobe | adobe_air | * | |
| adobe | adobe_air_sdk | * | |
| adobe | adobe_air_sdk_and_compiler | * | |
| adobe | flash_player | * | |
| adobe | flash_player | 14.0.0.125 | |
| adobe | flash_player | 14.0.0.145 | |
| adobe | flash_player | 14.0.0.176 | |
| adobe | flash_player | 14.0.0.179 | |
| adobe | flash_player | 15.0.0.144 | |
| adobe | flash_player | 15.0.0.152 | |
| adobe | flash_player | 15.0.0.167 | |
| adobe | flash_player | 15.0.0.189 | |
| adobe | flash_player | 15.0.0.223 | |
| adobe | flash_player | 15.0.0.238 | |
| adobe | flash_player | 15.0.0.239 | |
| adobe | flash_player | 15.0.0.246 | |
| adobe | flash_player | 16.0.0.234 | |
| adobe | flash_player | 16.0.0.235 | |
| apple | mac_os_x | * | |
| microsoft | windows | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D3365B-2275-4503-BE2C-34D6D9DF94F3",
"versionEndIncluding": "11.2.202.425",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90",
"versionEndIncluding": "13.0.0.259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors."
},
{
"lang": "es",
"value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes remotos obtener informaci\u00f3n sensible de procesos de memoria o causar una denegaci\u00f3n de servicio (lectura fuera de rango) a trav\u00e9s de vectores sin especificar"
}
],
"id": "CVE-2015-0307",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 7.8,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-13T23:59:06.070",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "psirt@adobe.com",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/72037"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/72037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-0308
Vulnerability from fkie_nvd - Published: 2015-01-13 23:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | adobe_air | * | |
| adobe | adobe_air | * | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | flash_player | * | |
| adobe | flash_player | 14.0.0.125 | |
| adobe | flash_player | 14.0.0.145 | |
| adobe | flash_player | 14.0.0.176 | |
| adobe | flash_player | 14.0.0.179 | |
| adobe | flash_player | 15.0.0.144 | |
| adobe | flash_player | 15.0.0.152 | |
| adobe | flash_player | 15.0.0.167 | |
| adobe | flash_player | 15.0.0.189 | |
| adobe | flash_player | 15.0.0.223 | |
| adobe | flash_player | 15.0.0.238 | |
| adobe | flash_player | 15.0.0.239 | |
| adobe | flash_player | 15.0.0.246 | |
| adobe | flash_player | 16.0.0.234 | |
| adobe | flash_player | 16.0.0.235 | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | adobe_air_sdk_and_compiler | * | |
| adobe | adobe_air_sdk | * | |
| adobe | flash_player | 11.2.202.425 | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90",
"versionEndIncluding": "13.0.0.259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*",
"matchCriteriaId": "B75E16B2-A24F-4E90-AA3F-F0A9114B5C85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar"
}
],
"evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/416.html\"\u003eCWE-416: Use After Free\u003c/a\u003e",
"id": "CVE-2015-0308",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-13T23:59:06.977",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "psirt@adobe.com",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/72039"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/72039"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-0306
Vulnerability from fkie_nvd - Published: 2015-01-13 23:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | flash_player | * | |
| adobe | flash_player | 14.0.0.125 | |
| adobe | flash_player | 14.0.0.145 | |
| adobe | flash_player | 14.0.0.176 | |
| adobe | flash_player | 14.0.0.179 | |
| adobe | flash_player | 15.0.0.144 | |
| adobe | flash_player | 15.0.0.152 | |
| adobe | flash_player | 15.0.0.167 | |
| adobe | flash_player | 15.0.0.189 | |
| adobe | flash_player | 15.0.0.223 | |
| adobe | flash_player | 15.0.0.238 | |
| adobe | flash_player | 15.0.0.239 | |
| adobe | flash_player | 15.0.0.246 | |
| adobe | flash_player | 16.0.0.234 | |
| adobe | flash_player | 16.0.0.235 | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | adobe_air | * | |
| adobe | adobe_air_sdk | * | |
| adobe | flash_player | * | |
| linux | linux_kernel | * | |
| adobe | adobe_air_sdk_and_compiler | * | |
| adobe | adobe_air | * | |
| apple | mac_os_x | * | |
| microsoft | windows | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90",
"versionEndIncluding": "13.0.0.259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D3365B-2275-4503-BE2C-34D6D9DF94F3",
"versionEndIncluding": "11.2.202.425",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303."
},
{
"lang": "es",
"value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferentes a CVE-2015-0303."
}
],
"id": "CVE-2015-0306",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-13T23:59:05.227",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "psirt@adobe.com",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/72036"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/72036"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-0305
Vulnerability from fkie_nvd - Published: 2015-01-13 23:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | adobe_air_sdk_and_compiler | * | |
| adobe | flash_player | * | |
| linux | linux_kernel | * | |
| adobe | adobe_air | * | |
| adobe | adobe_air | * | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | adobe_air_sdk | * | |
| adobe | flash_player | * | |
| adobe | flash_player | 14.0.0.125 | |
| adobe | flash_player | 14.0.0.145 | |
| adobe | flash_player | 14.0.0.176 | |
| adobe | flash_player | 14.0.0.179 | |
| adobe | flash_player | 15.0.0.144 | |
| adobe | flash_player | 15.0.0.152 | |
| adobe | flash_player | 15.0.0.167 | |
| adobe | flash_player | 15.0.0.189 | |
| adobe | flash_player | 15.0.0.223 | |
| adobe | flash_player | 15.0.0.238 | |
| adobe | flash_player | 15.0.0.239 | |
| adobe | flash_player | 15.0.0.246 | |
| adobe | flash_player | 16.0.0.234 | |
| adobe | flash_player | 16.0.0.235 | |
| apple | mac_os_x | * | |
| microsoft | windows | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D3365B-2275-4503-BE2C-34D6D9DF94F3",
"versionEndIncluding": "11.2.202.425",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90",
"versionEndIncluding": "13.0.0.259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified \"type confusion.\""
},
{
"lang": "es",
"value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes ejecutar c\u00f3digo arbitrario mediante el aprovechamiento de un \u0027tipo de confusi\u00f3n\u0027 no especificada."
}
],
"id": "CVE-2015-0305",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-13T23:59:04.397",
"references": [
{
"source": "psirt@adobe.com",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "psirt@adobe.com",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/72033"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/72033"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-0304
Vulnerability from fkie_nvd - Published: 2015-01-13 23:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | adobe_air_sdk | * | |
| adobe | adobe_air | * | |
| adobe | adobe_air | * | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | adobe_air_sdk_and_compiler | * | |
| adobe | flash_player | * | |
| adobe | flash_player | 14.0.0.125 | |
| adobe | flash_player | 14.0.0.145 | |
| adobe | flash_player | 14.0.0.176 | |
| adobe | flash_player | 14.0.0.179 | |
| adobe | flash_player | 15.0.0.144 | |
| adobe | flash_player | 15.0.0.152 | |
| adobe | flash_player | 15.0.0.167 | |
| adobe | flash_player | 15.0.0.189 | |
| adobe | flash_player | 15.0.0.223 | |
| adobe | flash_player | 15.0.0.238 | |
| adobe | flash_player | 15.0.0.239 | |
| adobe | flash_player | 15.0.0.246 | |
| adobe | flash_player | 16.0.0.234 | |
| adobe | flash_player | 16.0.0.235 | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | flash_player | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90",
"versionEndIncluding": "13.0.0.259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D3365B-2275-4503-BE2C-34D6D9DF94F3",
"versionEndIncluding": "11.2.202.425",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309."
},
{
"lang": "es",
"value": "Desbordamiento de buffer basado en memoria en Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2015-0309."
}
],
"id": "CVE-2015-0304",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-13T23:59:03.397",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "psirt@adobe.com",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/72032"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985"
},
{
"source": "psirt@adobe.com",
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/72032"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-0303
Vulnerability from fkie_nvd - Published: 2015-01-13 23:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | adobe_air | * | |
| adobe | adobe_air_sdk | * | |
| adobe | flash_player | 11.2.202.425 | |
| linux | linux_kernel | * | |
| adobe | adobe_air | * | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | flash_player | * | |
| adobe | flash_player | 14.0.0.125 | |
| adobe | flash_player | 14.0.0.145 | |
| adobe | flash_player | 14.0.0.176 | |
| adobe | flash_player | 14.0.0.179 | |
| adobe | flash_player | 15.0.0.144 | |
| adobe | flash_player | 15.0.0.152 | |
| adobe | flash_player | 15.0.0.167 | |
| adobe | flash_player | 15.0.0.189 | |
| adobe | flash_player | 15.0.0.223 | |
| adobe | flash_player | 15.0.0.238 | |
| adobe | flash_player | 15.0.0.239 | |
| adobe | flash_player | 15.0.0.246 | |
| adobe | flash_player | 16.0.0.234 | |
| adobe | flash_player | 16.0.0.235 | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | adobe_air_sdk_and_compiler | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*",
"matchCriteriaId": "B75E16B2-A24F-4E90-AA3F-F0A9114B5C85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90",
"versionEndIncluding": "13.0.0.259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306."
},
{
"lang": "es",
"value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2015-0306."
}
],
"id": "CVE-2015-0303",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-13T23:59:02.460",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "psirt@adobe.com",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/72031"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/72031"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-0302
Vulnerability from fkie_nvd - Published: 2015-01-13 23:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | flash_player | 11.2.202.425 | |
| linux | linux_kernel | * | |
| adobe | adobe_air | * | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | adobe_air_sdk | * | |
| adobe | flash_player | * | |
| adobe | flash_player | 14.0.0.125 | |
| adobe | flash_player | 14.0.0.145 | |
| adobe | flash_player | 14.0.0.176 | |
| adobe | flash_player | 14.0.0.179 | |
| adobe | flash_player | 15.0.0.144 | |
| adobe | flash_player | 15.0.0.152 | |
| adobe | flash_player | 15.0.0.167 | |
| adobe | flash_player | 15.0.0.189 | |
| adobe | flash_player | 15.0.0.223 | |
| adobe | flash_player | 15.0.0.238 | |
| adobe | flash_player | 15.0.0.239 | |
| adobe | flash_player | 15.0.0.246 | |
| adobe | flash_player | 16.0.0.234 | |
| adobe | flash_player | 16.0.0.235 | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | adobe_air | * | |
| adobe | adobe_air_sdk_and_compiler | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*",
"matchCriteriaId": "B75E16B2-A24F-4E90-AA3F-F0A9114B5C85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90",
"versionEndIncluding": "13.0.0.259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors."
},
{
"lang": "es",
"value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes obtener informaci\u00f3n sensible de las pulsaciones de teclado a trav\u00e9s de vectores sin especificar"
}
],
"id": "CVE-2015-0302",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-13T23:59:01.320",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "psirt@adobe.com",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/72035"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/72035"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-0301
Vulnerability from fkie_nvd - Published: 2015-01-13 23:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | adobe_air_sdk_and_compiler | * | |
| adobe | adobe_air | * | |
| adobe | adobe_air | * | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | adobe_air_sdk | * | |
| adobe | flash_player | 11.2.202.425 | |
| linux | linux_kernel | * | |
| adobe | flash_player | * | |
| adobe | flash_player | 14.0.0.125 | |
| adobe | flash_player | 14.0.0.145 | |
| adobe | flash_player | 14.0.0.176 | |
| adobe | flash_player | 14.0.0.179 | |
| adobe | flash_player | 15.0.0.144 | |
| adobe | flash_player | 15.0.0.152 | |
| adobe | flash_player | 15.0.0.167 | |
| adobe | flash_player | 15.0.0.189 | |
| adobe | flash_player | 15.0.0.223 | |
| adobe | flash_player | 15.0.0.238 | |
| adobe | flash_player | 15.0.0.239 | |
| adobe | flash_player | 15.0.0.246 | |
| adobe | flash_player | 16.0.0.234 | |
| adobe | flash_player | 16.0.0.235 | |
| apple | mac_os_x | * | |
| microsoft | windows | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*",
"matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6",
"versionEndIncluding": "15.0.0.356",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*",
"matchCriteriaId": "B75E16B2-A24F-4E90-AA3F-F0A9114B5C85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90",
"versionEndIncluding": "13.0.0.259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*",
"matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*",
"matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors."
},
{
"lang": "es",
"value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 no valida de forma adecuada los archivos, que tiene vectores de impacto y de ataques sin especificar"
}
],
"id": "CVE-2015-0301",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-13T23:59:00.053",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "psirt@adobe.com",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "psirt@adobe.com",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/72034"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62177"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/62740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/72034"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-1375
Vulnerability from fkie_nvd - Published: 2013-03-13 16:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D",
"versionEndIncluding": "11.6.602.171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*",
"matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*",
"matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*",
"matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*",
"matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*",
"matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*",
"matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*",
"matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*",
"matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*",
"matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*",
"matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*",
"matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*",
"matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*",
"matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*",
"matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*",
"matchCriteriaId": "B284F980-D84B-441A-A763-141935512562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*",
"matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*",
"matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*",
"matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*",
"matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*",
"matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*",
"matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*",
"matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*",
"matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*",
"matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*",
"matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240",
"versionEndIncluding": "11.2.202.273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*",
"matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*",
"matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*",
"matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*",
"matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*",
"matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*",
"matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*",
"matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*",
"matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353",
"versionEndIncluding": "11.1.111.43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353",
"versionEndIncluding": "11.1.111.43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*",
"matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*",
"matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*",
"matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*",
"matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*",
"matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*",
"matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*",
"matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*",
"matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*",
"matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
"matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353",
"versionEndIncluding": "11.1.111.43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*",
"matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*",
"matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*",
"matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*",
"matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*",
"matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*",
"matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*",
"matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*",
"matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F",
"versionEndIncluding": "3.6.0.599",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120",
"versionEndIncluding": "3.6.0.597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*",
"matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*",
"matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*",
"matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*",
"matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*",
"matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*",
"matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*",
"matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2",
"versionEndIncluding": "3.6.0.597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*",
"matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*",
"matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*",
"matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*",
"matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*",
"matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*",
"matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*",
"matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*",
"matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*",
"matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*",
"matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*",
"matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*",
"matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*",
"matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*",
"matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*",
"matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*",
"matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*",
"matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*",
"matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*",
"matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*",
"matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*",
"matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*",
"matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*",
"matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*",
"matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en la pila en Adobe Flash Player v10.3.183.68 y antes v11.x antes v11.6.602.180 en Windows y Mac OS X, antes v10.3.183.68 y v11.x antes v11.2.202.275 en Linux, antes v11.1.111.44 en Android v2.x v3.x, y antes de v11.1.115.48 en Android v4.x, Adobe AIR v3.6.0.6090 antes; Adobe AIR SDK antes de v3.6.0.6090, y Adobe AIR SDK Compiler antes de v3.6.0.6090 que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2013-1375",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-03-13T16:55:02.203",
"references": [
{
"source": "psirt@adobe.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html"
},
{
"source": "psirt@adobe.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html"
},
{
"source": "psirt@adobe.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html"
},
{
"source": "psirt@adobe.com",
"url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2"
},
{
"source": "psirt@adobe.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html"
},
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-0646
Vulnerability from fkie_nvd - Published: 2013-03-13 16:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D",
"versionEndIncluding": "11.6.602.171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*",
"matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*",
"matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*",
"matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*",
"matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*",
"matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*",
"matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*",
"matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*",
"matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*",
"matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*",
"matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*",
"matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*",
"matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*",
"matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*",
"matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*",
"matchCriteriaId": "B284F980-D84B-441A-A763-141935512562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*",
"matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*",
"matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*",
"matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*",
"matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*",
"matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*",
"matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*",
"matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*",
"matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*",
"matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*",
"matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240",
"versionEndIncluding": "11.2.202.273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*",
"matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*",
"matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*",
"matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*",
"matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*",
"matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*",
"matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*",
"matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*",
"matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353",
"versionEndIncluding": "11.1.111.43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353",
"versionEndIncluding": "11.1.111.43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*",
"matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*",
"matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*",
"matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*",
"matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*",
"matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*",
"matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*",
"matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*",
"matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*",
"matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
"matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353",
"versionEndIncluding": "11.1.111.43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*",
"matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*",
"matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*",
"matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*",
"matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*",
"matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*",
"matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*",
"matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*",
"matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F",
"versionEndIncluding": "3.6.0.599",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120",
"versionEndIncluding": "3.6.0.597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*",
"matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*",
"matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*",
"matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*",
"matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*",
"matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*",
"matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*",
"matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2",
"versionEndIncluding": "3.6.0.597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*",
"matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*",
"matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*",
"matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*",
"matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*",
"matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*",
"matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*",
"matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*",
"matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*",
"matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*",
"matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*",
"matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*",
"matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*",
"matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*",
"matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*",
"matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*",
"matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*",
"matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*",
"matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*",
"matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*",
"matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*",
"matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*",
"matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*",
"matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*",
"matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "Desbordamiento de entero en Adobe Flash Player anterior a v10.3.183.68 y v11.x before 11.6.602.180 en Windows y Mac OS X, anterior a v10.3.183.68 y v11.x anterior a v11.2.202.275 en Linux, anterior a v11.1.111.44 en Android v2.x yv 3.x, y anterior a v11.1.115.48 en Android v4.x; Adobe AIR anterior a v3.6.0.6090; Adobe AIR SDK anterior a v3.6.0.6090; y Adobe AIR SDK \u0026 Compiler anterior a v3.6.0.6090, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2013-0646",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-03-13T16:55:02.060",
"references": [
{
"source": "psirt@adobe.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html"
},
{
"source": "psirt@adobe.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html"
},
{
"source": "psirt@adobe.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html"
},
{
"source": "psirt@adobe.com",
"url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2"
},
{
"source": "psirt@adobe.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html"
},
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-0650
Vulnerability from fkie_nvd - Published: 2013-03-13 16:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D",
"versionEndIncluding": "11.6.602.171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*",
"matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*",
"matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*",
"matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*",
"matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*",
"matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*",
"matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*",
"matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*",
"matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*",
"matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*",
"matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*",
"matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*",
"matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*",
"matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*",
"matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*",
"matchCriteriaId": "B284F980-D84B-441A-A763-141935512562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*",
"matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*",
"matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*",
"matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*",
"matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*",
"matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*",
"matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*",
"matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*",
"matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*",
"matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*",
"matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240",
"versionEndIncluding": "11.2.202.273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*",
"matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*",
"matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*",
"matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*",
"matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*",
"matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*",
"matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*",
"matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*",
"matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*",
"matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353",
"versionEndIncluding": "11.1.111.43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353",
"versionEndIncluding": "11.1.111.43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*",
"matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*",
"matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*",
"matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*",
"matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*",
"matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*",
"matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*",
"matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*",
"matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*",
"matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
"matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353",
"versionEndIncluding": "11.1.111.43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*",
"matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*",
"matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*",
"matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
"matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
"matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*",
"matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*",
"matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*",
"matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*",
"matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*",
"matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*",
"matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*",
"matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F",
"versionEndIncluding": "3.6.0.599",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120",
"versionEndIncluding": "3.6.0.597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*",
"matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*",
"matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*",
"matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*",
"matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*",
"matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*",
"matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*",
"matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2",
"versionEndIncluding": "3.6.0.597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*",
"matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*",
"matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*",
"matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*",
"matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*",
"matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*",
"matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*",
"matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*",
"matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*",
"matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*",
"matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*",
"matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*",
"matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*",
"matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*",
"matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*",
"matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*",
"matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*",
"matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*",
"matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*",
"matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*",
"matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*",
"matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*",
"matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*",
"matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*",
"matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad Use-after-free en Adobe Flash Player antes de v10.3.183.68 y v11.x antes v11.6.602.180 en Windows y Mac OS X, antes de v10.3.183.68 y v11.x antes de v11.2.202.275 en Linux, antes de v11.1.111.44 en Android v2.x y v3.x, y antes de v11.1.115.48 en Android v4.x, Adobe AIR antes de v3.6.0.6090; Adobe AIR SDK antes de v3.6.0.6090, y Adobe AIR SDK Compiler antes de v3.6.0.6090 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2013-0650",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-03-13T16:55:02.163",
"references": [
{
"source": "psirt@adobe.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html"
},
{
"source": "psirt@adobe.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html"
},
{
"source": "psirt@adobe.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html"
},
{
"source": "psirt@adobe.com",
"url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2"
},
{
"source": "psirt@adobe.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html"
},
{
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2015-0308 (GCVE-0-2015-0308)
Vulnerability from cvelistv5 – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:11.028Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "72039",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72039"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150308-code-exec(99989)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "72039",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72039"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150308-code-exec(99989)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0308",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "72039",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72039"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150308-code-exec(99989)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0308",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:11.028Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0301 (GCVE-0-2015-0301)
Vulnerability from cvelistv5 – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:10.950Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150301-unspecified(99981)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72034",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72034"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150301-unspecified(99981)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72034",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72034"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0301",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150301-unspecified(99981)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72034",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72034"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0301",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:10.950Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0304 (GCVE-0-2015-0304)
Vulnerability from cvelistv5 – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:10.953Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "20141016 Adobe Flash Player Sound Object \"loadCompressedDataFromByteArray\" Heap Overflow Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE",
"x_transferred"
],
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150304-bo(99985)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72032",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72032"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "20141016 Adobe Flash Player Sound Object \"loadCompressedDataFromByteArray\" Heap Overflow Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE"
],
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150304-bo(99985)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72032",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72032"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "20141016 Adobe Flash Player Sound Object \"loadCompressedDataFromByteArray\" Heap Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150304-bo(99985)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72032",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72032"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0304",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:10.953Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0307 (GCVE-0-2015-0307)
Vulnerability from cvelistv5 – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:11.017Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "72037",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72037"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150307-info-disc(99988)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "72037",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72037"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150307-info-disc(99988)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0307",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "72037",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72037"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150307-info-disc(99988)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0307",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:11.017Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0309 (GCVE-0-2015-0309)
Vulnerability from cvelistv5 – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:10.911Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150309-bo(99986)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72038",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72038"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150309-bo(99986)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72038",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72038"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0309",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150309-bo(99986)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72038",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72038"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0309",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:10.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0305 (GCVE-0-2015-0305)
Vulnerability from cvelistv5 – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:11.034Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "72033",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72033"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150305-code-exec(99987)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified \"type confusion.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "72033",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72033"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150305-code-exec(99987)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0305",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified \"type confusion.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "72033",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72033"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150305-code-exec(99987)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0305",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:11.034Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0303 (GCVE-0-2015-0303)
Vulnerability from cvelistv5 – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:10.915Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150303-code-exec(99983)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72031",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72031"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150303-code-exec(99983)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72031",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72031"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0303",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150303-code-exec(99983)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72031",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72031"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0303",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:10.915Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0302 (GCVE-0-2015-0302)
Vulnerability from cvelistv5 – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:11.053Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150302-info-disc(99982)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72035",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72035"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150302-info-disc(99982)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72035",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72035"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0302",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150302-info-disc(99982)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72035",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72035"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0302",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:11.053Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0306 (GCVE-0-2015-0306)
Vulnerability from cvelistv5 – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:11.035Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "72036",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72036"
},
{
"name": "adobe-cve20150306-code-exec(99984)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "72036",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72036"
},
{
"name": "adobe-cve20150306-code-exec(99984)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0306",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "72036",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72036"
},
{
"name": "adobe-cve20150306-code-exec(99984)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0306",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:11.035Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0308 (GCVE-0-2015-0308)
Vulnerability from nvd – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:11.028Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "72039",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72039"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150308-code-exec(99989)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "72039",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72039"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150308-code-exec(99989)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0308",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "72039",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72039"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150308-code-exec(99989)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0308",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:11.028Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0301 (GCVE-0-2015-0301)
Vulnerability from nvd – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:10.950Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150301-unspecified(99981)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72034",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72034"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150301-unspecified(99981)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72034",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72034"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0301",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150301-unspecified(99981)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72034",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72034"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0301",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:10.950Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0304 (GCVE-0-2015-0304)
Vulnerability from nvd – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:10.953Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "20141016 Adobe Flash Player Sound Object \"loadCompressedDataFromByteArray\" Heap Overflow Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE",
"x_transferred"
],
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150304-bo(99985)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72032",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72032"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "20141016 Adobe Flash Player Sound Object \"loadCompressedDataFromByteArray\" Heap Overflow Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE"
],
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150304-bo(99985)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72032",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72032"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0304",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "20141016 Adobe Flash Player Sound Object \"loadCompressedDataFromByteArray\" Heap Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150304-bo(99985)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72032",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72032"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0304",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:10.953Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0307 (GCVE-0-2015-0307)
Vulnerability from nvd – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:11.017Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "72037",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72037"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150307-info-disc(99988)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "72037",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72037"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150307-info-disc(99988)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0307",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "72037",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72037"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "adobe-cve20150307-info-disc(99988)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0307",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:11.017Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0309 (GCVE-0-2015-0309)
Vulnerability from nvd – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:10.911Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150309-bo(99986)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72038",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72038"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150309-bo(99986)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72038",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72038"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0309",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150309-bo(99986)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72038",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72038"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0309",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:10.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0305 (GCVE-0-2015-0305)
Vulnerability from nvd – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:11.034Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "72033",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72033"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150305-code-exec(99987)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified \"type confusion.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "72033",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72033"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150305-code-exec(99987)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0305",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified \"type confusion.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "72033",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72033"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "adobe-cve20150305-code-exec(99987)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0305",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:11.034Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0303 (GCVE-0-2015-0303)
Vulnerability from nvd – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:10.915Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150303-code-exec(99983)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72031",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72031"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150303-code-exec(99983)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72031",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72031"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0303",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "adobe-cve20150303-code-exec(99983)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72031",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72031"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0303",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:10.915Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0302 (GCVE-0-2015-0302)
Vulnerability from nvd – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:11.053Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150302-info-disc(99982)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72035",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72035"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150302-info-disc(99982)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72035",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72035"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0302",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "adobe-cve20150302-info-disc(99982)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
},
{
"name": "72035",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72035"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0302",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:11.053Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0306 (GCVE-0-2015-0306)
Vulnerability from nvd – Published: 2015-01-13 23:00 – Updated: 2024-08-06 04:03
VLAI?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:03:11.035Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "72036",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72036"
},
{
"name": "adobe-cve20150306-code-exec(99984)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62187"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "62371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62177"
},
{
"name": "72036",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72036"
},
{
"name": "adobe-cve20150306-code-exec(99984)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62187"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2015-0306",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "62371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62371"
},
{
"name": "GLSA-201502-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201502-02.xml"
},
{
"name": "62740",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62740"
},
{
"name": "62177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62177"
},
{
"name": "72036",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72036"
},
{
"name": "adobe-cve20150306-code-exec(99984)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984"
},
{
"name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html",
"refsource": "CONFIRM",
"url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html"
},
{
"name": "62252",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62252"
},
{
"name": "1031525",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031525"
},
{
"name": "62187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62187"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2015-0306",
"datePublished": "2015-01-13T23:00:00",
"dateReserved": "2014-12-01T00:00:00",
"dateUpdated": "2024-08-06T04:03:11.035Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}