All the vulnerabilites related to adobe - adobe_air_sdk_and_compiler
cve-2015-0302
Vulnerability from cvelistv5
Published
2015-01-13 23:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62371 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201502-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/62740 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/62177 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99982 | vdb-entry, x_refsource_XF | |
http://helpx.adobe.com/security/products/flash-player/apsb15-01.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/62252 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1031525 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/62187 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/72035 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:11.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62177" }, { "name": "adobe-cve20150302-info-disc(99982)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62187" }, { "name": "72035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72035" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62177" }, { "name": "adobe-cve20150302-info-disc(99982)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62187" }, { "name": "72035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72035" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-0302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62177" }, { "name": "adobe-cve20150302-info-disc(99982)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982" }, { "name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62187" }, { "name": "72035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72035" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-0302", "datePublished": "2015-01-13T23:00:00", "dateReserved": "2014-12-01T00:00:00", "dateUpdated": "2024-08-06T04:03:11.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0308
Vulnerability from cvelistv5
Published
2015-01-13 23:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62371 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201502-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/62740 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/62177 | third-party-advisory, x_refsource_SECUNIA | |
http://helpx.adobe.com/security/products/flash-player/apsb15-01.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/72039 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/62252 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1031525 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/62187 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99989 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:11.028Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62177" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "72039", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72039" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62187" }, { "name": "adobe-cve20150308-code-exec(99989)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62177" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "72039", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72039" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62187" }, { "name": "adobe-cve20150308-code-exec(99989)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-0308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62177" }, { "name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "72039", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72039" }, { "name": "62252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62187" }, { "name": "adobe-cve20150308-code-exec(99989)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-0308", "datePublished": "2015-01-13T23:00:00", "dateReserved": "2014-12-01T00:00:00", "dateUpdated": "2024-08-06T04:03:11.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1375
Vulnerability from cvelistv5
Published
2013-03-13 10:00
Modified
2024-08-06 14:57
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb13-09.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html | vendor-advisory, x_refsource_SUSE | |
http://marc.info/?l=bugtraq&m=139455789818399&w=2 | vendor-advisory, x_refsource_HP | |
http://rhn.redhat.com/errata/RHSA-2013-0643.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.056Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-17T13:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1375", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0464", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-09.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1375", "datePublished": "2013-03-13T10:00:00", "dateReserved": "2013-01-16T00:00:00", "dateUpdated": "2024-08-06T14:57:05.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0309
Vulnerability from cvelistv5
Published
2015-01-13 23:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62371 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201502-02.xml | vendor-advisory, x_refsource_GENTOO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99986 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/62740 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/62177 | third-party-advisory, x_refsource_SECUNIA | |
http://helpx.adobe.com/security/products/flash-player/apsb15-01.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/62252 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1031525 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/62187 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/72038 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "adobe-cve20150309-bo(99986)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62177" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62187" }, { "name": "72038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72038" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "adobe-cve20150309-bo(99986)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62177" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62187" }, { "name": "72038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72038" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-0309", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "adobe-cve20150309-bo(99986)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986" }, { "name": "62740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62177" }, { "name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62187" }, { "name": "72038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72038" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-0309", "datePublished": "2015-01-13T23:00:00", "dateReserved": "2014-12-01T00:00:00", "dateUpdated": "2024-08-06T04:03:10.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0646
Vulnerability from cvelistv5
Published
2013-03-13 10:00
Modified
2024-08-06 14:33
Severity ?
EPSS score ?
Summary
Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb13-09.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html | vendor-advisory, x_refsource_SUSE | |
http://marc.info/?l=bugtraq&m=139455789818399&w=2 | vendor-advisory, x_refsource_HP | |
http://rhn.redhat.com/errata/RHSA-2013-0643.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-17T13:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-0646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0464", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-09.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-0646", "datePublished": "2013-03-13T10:00:00", "dateReserved": "2012-12-18T00:00:00", "dateUpdated": "2024-08-06T14:33:05.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0301
Vulnerability from cvelistv5
Published
2015-01-13 23:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62371 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201502-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/62740 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/62177 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99981 | vdb-entry, x_refsource_XF | |
http://helpx.adobe.com/security/products/flash-player/apsb15-01.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/62252 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1031525 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/62187 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/72034 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.950Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62177" }, { "name": "adobe-cve20150301-unspecified(99981)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62187" }, { "name": "72034", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72034" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62177" }, { "name": "adobe-cve20150301-unspecified(99981)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62187" }, { "name": "72034", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72034" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-0301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62177" }, { "name": "adobe-cve20150301-unspecified(99981)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981" }, { "name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62187" }, { "name": "72034", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72034" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-0301", "datePublished": "2015-01-13T23:00:00", "dateReserved": "2014-12-01T00:00:00", "dateUpdated": "2024-08-06T04:03:10.950Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0305
Vulnerability from cvelistv5
Published
2015-01-13 23:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62371 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201502-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/62740 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/72033 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/62177 | third-party-advisory, x_refsource_SECUNIA | |
http://helpx.adobe.com/security/products/flash-player/apsb15-01.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/62252 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1031525 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99987 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/62187 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:11.034Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62740" }, { "name": "72033", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72033" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62177" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "adobe-cve20150305-code-exec(99987)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62187" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified \"type confusion.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62740" }, { "name": "72033", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72033" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62177" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "adobe-cve20150305-code-exec(99987)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62187" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-0305", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified \"type confusion.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62740" }, { "name": "72033", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72033" }, { "name": "62177", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62177" }, { "name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031525" }, { "name": "adobe-cve20150305-code-exec(99987)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987" }, { "name": "62187", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62187" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-0305", "datePublished": "2015-01-13T23:00:00", "dateReserved": "2014-12-01T00:00:00", "dateUpdated": "2024-08-06T04:03:11.034Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1371
Vulnerability from cvelistv5
Published
2013-03-13 10:00
Modified
2024-08-06 14:57
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb13-09.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html | vendor-advisory, x_refsource_SUSE | |
http://marc.info/?l=bugtraq&m=139455789818399&w=2 | vendor-advisory, x_refsource_HP | |
http://rhn.redhat.com/errata/RHSA-2013-0643.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-17T13:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1371", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0464", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-09.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1371", "datePublished": "2013-03-13T10:00:00", "dateReserved": "2013-01-16T00:00:00", "dateUpdated": "2024-08-06T14:57:05.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0306
Vulnerability from cvelistv5
Published
2015-01-13 23:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62371 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201502-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/62740 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/62177 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/72036 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99984 | vdb-entry, x_refsource_XF | |
http://helpx.adobe.com/security/products/flash-player/apsb15-01.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/62252 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1031525 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/62187 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:11.035Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62177" }, { "name": "72036", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72036" }, { "name": "adobe-cve20150306-code-exec(99984)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62187" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62177" }, { "name": "72036", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72036" }, { "name": "adobe-cve20150306-code-exec(99984)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62187" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-0306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62177" }, { "name": "72036", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72036" }, { "name": "adobe-cve20150306-code-exec(99984)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984" }, { "name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62187" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-0306", "datePublished": "2015-01-13T23:00:00", "dateReserved": "2014-12-01T00:00:00", "dateUpdated": "2024-08-06T04:03:11.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0303
Vulnerability from cvelistv5
Published
2015-01-13 23:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62371 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201502-02.xml | vendor-advisory, x_refsource_GENTOO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99983 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/62740 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/62177 | third-party-advisory, x_refsource_SECUNIA | |
http://helpx.adobe.com/security/products/flash-player/apsb15-01.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/62252 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1031525 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/62187 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/72031 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.915Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "adobe-cve20150303-code-exec(99983)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62177" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62187" }, { "name": "72031", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72031" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "adobe-cve20150303-code-exec(99983)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62177" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62187" }, { "name": "72031", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72031" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-0303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "adobe-cve20150303-code-exec(99983)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983" }, { "name": "62740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62177" }, { "name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031525" }, { "name": "62187", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62187" }, { "name": "72031", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72031" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-0303", "datePublished": "2015-01-13T23:00:00", "dateReserved": "2014-12-01T00:00:00", "dateUpdated": "2024-08-06T04:03:10.915Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0304
Vulnerability from cvelistv5
Published
2015-01-13 23:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62371 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201502-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/62740 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/62177 | third-party-advisory, x_refsource_SECUNIA | |
https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089 | third-party-advisory, x_refsource_IDEFENSE | |
http://helpx.adobe.com/security/products/flash-player/apsb15-01.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/62252 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1031525 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99985 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/62187 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/72032 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62177" }, { "name": "20141016 Adobe Flash Player Sound Object \"loadCompressedDataFromByteArray\" Heap Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "adobe-cve20150304-bo(99985)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62187" }, { "name": "72032", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62177" }, { "name": "20141016 Adobe Flash Player Sound Object \"loadCompressedDataFromByteArray\" Heap Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "adobe-cve20150304-bo(99985)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62187" }, { "name": "72032", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72032" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-0304", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62177" }, { "name": "20141016 Adobe Flash Player Sound Object \"loadCompressedDataFromByteArray\" Heap Overflow Vulnerability", "refsource": "IDEFENSE", "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089" }, { "name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031525" }, { "name": "adobe-cve20150304-bo(99985)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985" }, { "name": "62187", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62187" }, { "name": "72032", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72032" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-0304", "datePublished": "2015-01-13T23:00:00", "dateReserved": "2014-12-01T00:00:00", "dateUpdated": "2024-08-06T04:03:10.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0650
Vulnerability from cvelistv5
Published
2013-03-13 10:00
Modified
2024-08-06 14:33
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb13-09.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html | vendor-advisory, x_refsource_SUSE | |
http://marc.info/?l=bugtraq&m=139455789818399&w=2 | vendor-advisory, x_refsource_HP | |
http://rhn.redhat.com/errata/RHSA-2013-0643.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-17T13:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-0650", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0464", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-09.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-0650", "datePublished": "2013-03-13T10:00:00", "dateReserved": "2012-12-18T00:00:00", "dateUpdated": "2024-08-06T14:33:05.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-0307
Vulnerability from cvelistv5
Published
2015-01-13 23:00
Modified
2024-08-06 04:03
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/62371 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201502-02.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/62740 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/62177 | third-party-advisory, x_refsource_SECUNIA | |
http://helpx.adobe.com/security/products/flash-player/apsb15-01.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/62252 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1031525 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/72037 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/62187 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99988 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:11.017Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62177" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "72037", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72037" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62187" }, { "name": "adobe-cve20150307-info-disc(99988)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "62371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62177" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031525" }, { "name": "72037", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72037" }, { "name": "62187", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62187" }, { "name": "adobe-cve20150307-info-disc(99988)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2015-0307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62371" }, { "name": "GLSA-201502-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "name": "62740", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62740" }, { "name": "62177", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62177" }, { "name": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "name": "62252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62252" }, { "name": "1031525", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031525" }, { "name": "72037", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72037" }, { "name": "62187", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62187" }, { "name": "adobe-cve20150307-info-disc(99988)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2015-0307", "datePublished": "2015-01-13T23:00:00", "dateReserved": "2014-12-01T00:00:00", "dateUpdated": "2024-08-06T04:03:11.017Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-03-13 16:55
Modified
2024-11-21 01:47
Severity ?
Summary
Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D", "versionEndIncluding": "11.6.602.171", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*", "matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*", "matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*", "matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*", "matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*", "matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*", "matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*", "matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*", "matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*", "matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*", "matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240", "versionEndIncluding": "11.2.202.273", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F", "versionEndIncluding": "3.6.0.599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*", "matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*", "matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de entero en Adobe Flash Player anterior a v10.3.183.68 y v11.x before 11.6.602.180 en Windows y Mac OS X, anterior a v10.3.183.68 y v11.x anterior a v11.2.202.275 en Linux, anterior a v11.1.111.44 en Android v2.x yv 3.x, y anterior a v11.1.115.48 en Android v4.x; Adobe AIR anterior a v3.6.0.6090; Adobe AIR SDK anterior a v3.6.0.6090; y Adobe AIR SDK \u0026 Compiler anterior a v3.6.0.6090, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-0646", "lastModified": "2024-11-21T01:47:56.187", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-13T16:55:02.060", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "psirt@adobe.com", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "psirt@adobe.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-13 16:55
Modified
2024-11-21 01:47
Severity ?
Summary
Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D", "versionEndIncluding": "11.6.602.171", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*", "matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*", "matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*", "matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*", "matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*", "matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*", "matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*", "matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*", "matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*", "matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*", "matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240", "versionEndIncluding": "11.2.202.273", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F", "versionEndIncluding": "3.6.0.599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*", "matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*", "matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad Use-after-free en Adobe Flash Player antes de v10.3.183.68 y v11.x antes v11.6.602.180 en Windows y Mac OS X, antes de v10.3.183.68 y v11.x antes de v11.2.202.275 en Linux, antes de v11.1.111.44 en Android v2.x y v3.x, y antes de v11.1.115.48 en Android v4.x, Adobe AIR antes de v3.6.0.6090; Adobe AIR SDK antes de v3.6.0.6090, y Adobe AIR SDK Compiler antes de v3.6.0.6090 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-0650", "lastModified": "2024-11-21T01:47:56.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-13T16:55:02.163", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "psirt@adobe.com", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "psirt@adobe.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-13 23:59
Modified
2024-11-21 02:22
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | adobe_air_sdk_and_compiler | * | |
adobe | flash_player | * | |
linux | linux_kernel | * | |
adobe | adobe_air | * | |
adobe | adobe_air | * | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | adobe_air_sdk | * | |
adobe | flash_player | * | |
adobe | flash_player | 14.0.0.125 | |
adobe | flash_player | 14.0.0.145 | |
adobe | flash_player | 14.0.0.176 | |
adobe | flash_player | 14.0.0.179 | |
adobe | flash_player | 15.0.0.144 | |
adobe | flash_player | 15.0.0.152 | |
adobe | flash_player | 15.0.0.167 | |
adobe | flash_player | 15.0.0.189 | |
adobe | flash_player | 15.0.0.223 | |
adobe | flash_player | 15.0.0.238 | |
adobe | flash_player | 15.0.0.239 | |
adobe | flash_player | 15.0.0.246 | |
adobe | flash_player | 16.0.0.234 | |
adobe | flash_player | 16.0.0.235 | |
apple | mac_os_x | * | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4D3365B-2275-4503-BE2C-34D6D9DF94F3", "versionEndIncluding": "11.2.202.425", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90", "versionEndIncluding": "13.0.0.259", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified \"type confusion.\"" }, { "lang": "es", "value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes ejecutar c\u00f3digo arbitrario mediante el aprovechamiento de un \u0027tipo de confusi\u00f3n\u0027 no especificada." } ], "id": "CVE-2015-0305", "lastModified": "2024-11-21T02:22:46.803", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-13T23:59:04.397", "references": [ { "source": "psirt@adobe.com", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62177" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62187" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62252" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62371" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62740" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/72033" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99987" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-13 23:59
Modified
2024-11-21 02:22
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | adobe_air | * | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | flash_player | * | |
linux | linux_kernel | * | |
adobe | adobe_air | * | |
adobe | adobe_air_sdk | * | |
adobe | adobe_air_sdk_and_compiler | * | |
adobe | flash_player | * | |
adobe | flash_player | 14.0.0.125 | |
adobe | flash_player | 14.0.0.145 | |
adobe | flash_player | 14.0.0.176 | |
adobe | flash_player | 14.0.0.179 | |
adobe | flash_player | 15.0.0.144 | |
adobe | flash_player | 15.0.0.152 | |
adobe | flash_player | 15.0.0.167 | |
adobe | flash_player | 15.0.0.189 | |
adobe | flash_player | 15.0.0.223 | |
adobe | flash_player | 15.0.0.238 | |
adobe | flash_player | 15.0.0.239 | |
adobe | flash_player | 15.0.0.246 | |
adobe | flash_player | 16.0.0.234 | |
adobe | flash_player | 16.0.0.235 | |
apple | mac_os_x | * | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4D3365B-2275-4503-BE2C-34D6D9DF94F3", "versionEndIncluding": "11.2.202.425", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90", "versionEndIncluding": "13.0.0.259", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors." }, { "lang": "es", "value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes remotos obtener informaci\u00f3n sensible de procesos de memoria o causar una denegaci\u00f3n de servicio (lectura fuera de rango) a trav\u00e9s de vectores sin especificar" } ], "id": "CVE-2015-0307", "lastModified": "2024-11-21T02:22:47.063", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 7.8, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-13T23:59:06.070", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62177" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62187" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62252" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62371" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62740" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/72037" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99988" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-13 23:59
Modified
2024-11-21 02:22
Severity ?
Summary
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | adobe_air | * | |
adobe | adobe_air | * | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | flash_player | * | |
adobe | flash_player | 14.0.0.125 | |
adobe | flash_player | 14.0.0.145 | |
adobe | flash_player | 14.0.0.176 | |
adobe | flash_player | 14.0.0.179 | |
adobe | flash_player | 15.0.0.144 | |
adobe | flash_player | 15.0.0.152 | |
adobe | flash_player | 15.0.0.167 | |
adobe | flash_player | 15.0.0.189 | |
adobe | flash_player | 15.0.0.223 | |
adobe | flash_player | 15.0.0.238 | |
adobe | flash_player | 15.0.0.239 | |
adobe | flash_player | 15.0.0.246 | |
adobe | flash_player | 16.0.0.234 | |
adobe | flash_player | 16.0.0.235 | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | adobe_air_sdk_and_compiler | * | |
adobe | adobe_air_sdk | * | |
adobe | flash_player | 11.2.202.425 | |
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90", "versionEndIncluding": "13.0.0.259", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*", "matchCriteriaId": "B75E16B2-A24F-4E90-AA3F-F0A9114B5C85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n en Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar" } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/416.html\"\u003eCWE-416: Use After Free\u003c/a\u003e", "id": "CVE-2015-0308", "lastModified": "2024-11-21T02:22:47.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-13T23:59:06.977", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62177" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62187" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62252" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62371" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62740" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/72039" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99989" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-13 16:55
Modified
2024-11-21 01:49
Severity ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D", "versionEndIncluding": "11.6.602.171", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*", "matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*", "matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*", "matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*", "matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*", "matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*", "matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*", "matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*", "matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*", "matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*", "matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240", "versionEndIncluding": "11.2.202.273", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F", "versionEndIncluding": "3.6.0.599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*", "matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*", "matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en la pila en Adobe Flash Player v10.3.183.68 y antes v11.x antes v11.6.602.180 en Windows y Mac OS X, antes v10.3.183.68 y v11.x antes v11.2.202.275 en Linux, antes v11.1.111.44 en Android v2.x v3.x, y antes de v11.1.115.48 en Android v4.x, Adobe AIR v3.6.0.6090 antes; Adobe AIR SDK antes de v3.6.0.6090, y Adobe AIR SDK Compiler antes de v3.6.0.6090 que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-1375", "lastModified": "2024-11-21T01:49:27.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-13T16:55:02.203", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "psirt@adobe.com", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "psirt@adobe.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-13 23:59
Modified
2024-11-21 02:22
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | flash_player | * | |
adobe | flash_player | 14.0.0.125 | |
adobe | flash_player | 14.0.0.145 | |
adobe | flash_player | 14.0.0.176 | |
adobe | flash_player | 14.0.0.179 | |
adobe | flash_player | 15.0.0.144 | |
adobe | flash_player | 15.0.0.152 | |
adobe | flash_player | 15.0.0.167 | |
adobe | flash_player | 15.0.0.189 | |
adobe | flash_player | 15.0.0.223 | |
adobe | flash_player | 15.0.0.238 | |
adobe | flash_player | 15.0.0.239 | |
adobe | flash_player | 15.0.0.246 | |
adobe | flash_player | 16.0.0.234 | |
adobe | flash_player | 16.0.0.235 | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | adobe_air | * | |
adobe | adobe_air_sdk | * | |
adobe | flash_player | * | |
linux | linux_kernel | * | |
adobe | adobe_air_sdk_and_compiler | * | |
adobe | adobe_air | * | |
apple | mac_os_x | * | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90", "versionEndIncluding": "13.0.0.259", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4D3365B-2275-4503-BE2C-34D6D9DF94F3", "versionEndIncluding": "11.2.202.425", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303." }, { "lang": "es", "value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferentes a CVE-2015-0303." } ], "id": "CVE-2015-0306", "lastModified": "2024-11-21T02:22:46.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-13T23:59:05.227", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62177" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62187" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62252" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62371" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62740" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/72036" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99984" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-13 23:59
Modified
2024-11-21 02:22
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | flash_player | 11.2.202.425 | |
linux | linux_kernel | * | |
adobe | adobe_air | * | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | adobe_air_sdk | * | |
adobe | flash_player | * | |
adobe | flash_player | 14.0.0.125 | |
adobe | flash_player | 14.0.0.145 | |
adobe | flash_player | 14.0.0.176 | |
adobe | flash_player | 14.0.0.179 | |
adobe | flash_player | 15.0.0.144 | |
adobe | flash_player | 15.0.0.152 | |
adobe | flash_player | 15.0.0.167 | |
adobe | flash_player | 15.0.0.189 | |
adobe | flash_player | 15.0.0.223 | |
adobe | flash_player | 15.0.0.238 | |
adobe | flash_player | 15.0.0.239 | |
adobe | flash_player | 15.0.0.246 | |
adobe | flash_player | 16.0.0.234 | |
adobe | flash_player | 16.0.0.235 | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | adobe_air | * | |
adobe | adobe_air_sdk_and_compiler | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*", "matchCriteriaId": "B75E16B2-A24F-4E90-AA3F-F0A9114B5C85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90", "versionEndIncluding": "13.0.0.259", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors." }, { "lang": "es", "value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes obtener informaci\u00f3n sensible de las pulsaciones de teclado a trav\u00e9s de vectores sin especificar" } ], "id": "CVE-2015-0302", "lastModified": "2024-11-21T02:22:46.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-13T23:59:01.320", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62177" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62187" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62252" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62371" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62740" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/72035" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99982" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-13 23:59
Modified
2024-11-21 02:22
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | adobe_air | * | |
adobe | adobe_air_sdk | * | |
adobe | flash_player | 11.2.202.425 | |
linux | linux_kernel | * | |
adobe | adobe_air | * | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | flash_player | * | |
adobe | flash_player | 14.0.0.125 | |
adobe | flash_player | 14.0.0.145 | |
adobe | flash_player | 14.0.0.176 | |
adobe | flash_player | 14.0.0.179 | |
adobe | flash_player | 15.0.0.144 | |
adobe | flash_player | 15.0.0.152 | |
adobe | flash_player | 15.0.0.167 | |
adobe | flash_player | 15.0.0.189 | |
adobe | flash_player | 15.0.0.223 | |
adobe | flash_player | 15.0.0.238 | |
adobe | flash_player | 15.0.0.239 | |
adobe | flash_player | 15.0.0.246 | |
adobe | flash_player | 16.0.0.234 | |
adobe | flash_player | 16.0.0.235 | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | adobe_air_sdk_and_compiler | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*", "matchCriteriaId": "B75E16B2-A24F-4E90-AA3F-F0A9114B5C85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90", "versionEndIncluding": "13.0.0.259", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306." }, { "lang": "es", "value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2015-0306." } ], "id": "CVE-2015-0303", "lastModified": "2024-11-21T02:22:46.507", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-13T23:59:02.460", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62177" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62187" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62252" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62371" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62740" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/72031" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99983" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-13 23:59
Modified
2024-11-21 02:22
Severity ?
Summary
Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | adobe_air_sdk_and_compiler | * | |
adobe | adobe_air | * | |
adobe | adobe_air | * | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | adobe_air_sdk | * | |
adobe | flash_player | 11.2.202.425 | |
linux | linux_kernel | * | |
adobe | flash_player | * | |
adobe | flash_player | 14.0.0.125 | |
adobe | flash_player | 14.0.0.145 | |
adobe | flash_player | 14.0.0.176 | |
adobe | flash_player | 14.0.0.179 | |
adobe | flash_player | 15.0.0.144 | |
adobe | flash_player | 15.0.0.152 | |
adobe | flash_player | 15.0.0.167 | |
adobe | flash_player | 15.0.0.189 | |
adobe | flash_player | 15.0.0.223 | |
adobe | flash_player | 15.0.0.238 | |
adobe | flash_player | 15.0.0.239 | |
adobe | flash_player | 15.0.0.246 | |
adobe | flash_player | 16.0.0.234 | |
adobe | flash_player | 16.0.0.235 | |
apple | mac_os_x | * | |
microsoft | windows | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*", "matchCriteriaId": "B75E16B2-A24F-4E90-AA3F-F0A9114B5C85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90", "versionEndIncluding": "13.0.0.259", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors." }, { "lang": "es", "value": "Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 no valida de forma adecuada los archivos, que tiene vectores de impacto y de ataques sin especificar" } ], "id": "CVE-2015-0301", "lastModified": "2024-11-21T02:22:46.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-13T23:59:00.053", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62177" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62187" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62252" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62371" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62740" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/72034" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99981" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-13 23:59
Modified
2024-11-21 02:22
Severity ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | adobe_air | * | |
adobe | adobe_air_sdk_and_compiler | * | |
adobe | flash_player | * | |
adobe | flash_player | 14.0.0.125 | |
adobe | flash_player | 14.0.0.145 | |
adobe | flash_player | 14.0.0.176 | |
adobe | flash_player | 14.0.0.179 | |
adobe | flash_player | 15.0.0.144 | |
adobe | flash_player | 15.0.0.152 | |
adobe | flash_player | 15.0.0.167 | |
adobe | flash_player | 15.0.0.189 | |
adobe | flash_player | 15.0.0.223 | |
adobe | flash_player | 15.0.0.238 | |
adobe | flash_player | 15.0.0.239 | |
adobe | flash_player | 15.0.0.246 | |
adobe | flash_player | 16.0.0.234 | |
adobe | flash_player | 16.0.0.235 | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | flash_player | 11.2.202.425 | |
linux | linux_kernel | * | |
adobe | adobe_air | * | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | adobe_air_sdk | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90", "versionEndIncluding": "13.0.0.259", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.425:*:*:*:*:*:*:*", "matchCriteriaId": "B75E16B2-A24F-4E90-AA3F-F0A9114B5C85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304." }, { "lang": "es", "value": "Desbordamiento de buffer en memoria en Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2015-0304" } ], "id": "CVE-2015-0309", "lastModified": "2024-11-21T02:22:47.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-13T23:59:07.883", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62177" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62187" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62252" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62371" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62740" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/72038" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99986" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-13 23:59
Modified
2024-11-21 02:22
Severity ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | adobe_air_sdk | * | |
adobe | adobe_air | * | |
adobe | adobe_air | * | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | adobe_air_sdk_and_compiler | * | |
adobe | flash_player | * | |
adobe | flash_player | 14.0.0.125 | |
adobe | flash_player | 14.0.0.145 | |
adobe | flash_player | 14.0.0.176 | |
adobe | flash_player | 14.0.0.179 | |
adobe | flash_player | 15.0.0.144 | |
adobe | flash_player | 15.0.0.152 | |
adobe | flash_player | 15.0.0.167 | |
adobe | flash_player | 15.0.0.189 | |
adobe | flash_player | 15.0.0.223 | |
adobe | flash_player | 15.0.0.238 | |
adobe | flash_player | 15.0.0.239 | |
adobe | flash_player | 15.0.0.246 | |
adobe | flash_player | 16.0.0.234 | |
adobe | flash_player | 16.0.0.235 | |
apple | mac_os_x | * | |
microsoft | windows | * | |
adobe | flash_player | * | |
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "62F29329-CF1D-4205-BF9C-ABEE5A17A4E6", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:android:*:*", "matchCriteriaId": "73588000-26DE-4357-83BD-4F932BE76DD1", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "9702A7E7-D670-4904-90F5-972C91499947", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4EAFECD-8468-4C59-AB9F-AF9E3C6EC656", "versionEndIncluding": "15.0.0.356", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C41ABC4-7EE5-4B8F-8331-96726E827D90", "versionEndIncluding": "13.0.0.259", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "matchCriteriaId": "D5D7202D-56DF-400B-9F09-E7D9938222D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "matchCriteriaId": "4D4F0D21-A64B-46C1-9591-96529661DF0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "matchCriteriaId": "86961019-3B81-458E-949F-A2F006EA55FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "matchCriteriaId": "25895BE9-71FD-4DE7-90FC-0199470A8738", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*", "matchCriteriaId": "57882CDA-B99B-40EC-921A-8DFF5D820C97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "matchCriteriaId": "4D55A950-7D48-413C-AD43-6AC64FBE790C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "matchCriteriaId": "F1A22B74-453D-4A8A-B79A-2B3143A0D995", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "matchCriteriaId": "3FE4B077-67D1-4B25-976E-715FB6B2A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "matchCriteriaId": "BFC91B68-6B35-47BD-BC02-3F836E772CF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.238:*:*:*:*:*:*:*", "matchCriteriaId": "E3F55018-24D7-486E-974F-D4CEDA5CDDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "matchCriteriaId": "A3BE6004-C30A-46E2-9F25-785E12BBF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "matchCriteriaId": "CFE8E51F-7A32-41A4-B03A-73E52EB64C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.234:*:*:*:*:*:*:*", "matchCriteriaId": "681E567A-444A-442C-9923-F65106F0DE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "matchCriteriaId": "3E13E927-A77C-4681-AFDE-A5A14093234D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4D3365B-2275-4503-BE2C-34D6D9DF94F3", "versionEndIncluding": "11.2.202.425", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK \u0026 Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309." }, { "lang": "es", "value": "Desbordamiento de buffer basado en memoria en Adobe Flash Player anterior a 13.0.0.260 y 14.x a trav\u00e9s de 16.x anterior a 16.0.0.257 en Windows y OS X y anterior a 11.2.202.429 en Linux, Adobe AIR anterior a 16.0.0.245 en Windows y OS X y anterior a 16.0.0.272 en Android, Adobe AIR SDK anterior a 16.0.0.272, y Adobe AIR SDK \u0026 Compiler anterior a 16.0.0.272 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar, una vulnerabilidad diferente a CVE-2015-0309." } ], "id": "CVE-2015-0304", "lastModified": "2024-11-21T02:22:46.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-13T23:59:03.397", "references": [ { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62177" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62187" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62252" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62371" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/62740" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/72032" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985" }, { "source": "psirt@adobe.com", "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb15-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1089" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-13 16:55
Modified
2024-11-21 01:49
Severity ?
Summary
Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D", "versionEndIncluding": "11.6.602.171", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*", "matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*", "matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*", "matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*", "matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*", "matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*", "matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*", "matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*", "matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*", "matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*", "matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240", "versionEndIncluding": "11.2.202.273", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F", "versionEndIncluding": "3.6.0.599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*", "matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*", "matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Flash Player v10.3.183.68 y v11.x antes de v11.6.602.180 en Windows y Mac OS X, antes de v10.3.183.68 y v11.x antes de v11.2.202.275 en Linux, antes de v11.1.111.44 en Android v2.x y v3.x y antes de v11.1.115.48 en Android 4.x, Adobe AIR v3.6.0.6090 antes; Adobe AIR SDK antes de v3.6.0.6090, y Adobe AIR SDK Compiler antes de v3.6.0.6090 que permiten a un atacante ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-1371", "lastModified": "2024-11-21T01:49:27.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-13T16:55:02.183", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "psirt@adobe.com", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "psirt@adobe.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }