All the vulnerabilites related to adobe - flash_player_for_android
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de corrupci\u00f3n de memoria en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5261", "lastModified": "2024-11-21T01:44:21.523", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.970", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86038" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79082" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5255", "lastModified": "2024-11-21T01:44:20.730", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.720", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86032" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79076" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-13 16:55
Modified
2024-11-21 01:47
Severity ?
Summary
Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D", "versionEndIncluding": "11.6.602.171", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*", "matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*", "matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*", "matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*", "matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*", "matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*", "matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*", "matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*", "matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*", "matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*", "matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240", "versionEndIncluding": "11.2.202.273", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F", "versionEndIncluding": "3.6.0.599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*", "matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*", "matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de entero en Adobe Flash Player anterior a v10.3.183.68 y v11.x before 11.6.602.180 en Windows y Mac OS X, anterior a v10.3.183.68 y v11.x anterior a v11.2.202.275 en Linux, anterior a v11.1.111.44 en Android v2.x yv 3.x, y anterior a v11.1.115.48 en Android v4.x; Adobe AIR anterior a v3.6.0.6090; Adobe AIR SDK anterior a v3.6.0.6090; y Adobe AIR SDK \u0026 Compiler anterior a v3.6.0.6090, permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-0646", "lastModified": "2024-11-21T01:47:56.187", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-13T16:55:02.060", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "psirt@adobe.com", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "psirt@adobe.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE diferentes a corrupci\u00f3n de memoria en Flash Player diferente listada como APSB12-22." } ], "id": "CVE-2012-5272", "lastModified": "2024-11-21T01:44:23.030", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.533", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86049" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de corrupci\u00f3n de memoria en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5264", "lastModified": "2024-11-21T01:44:21.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.097", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86041" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79085" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79085" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5257", "lastModified": "2024-11-21T01:44:20.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.813", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86034" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79078" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5262", "lastModified": "2024-11-21T01:44:21.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.000", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86039" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79083" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5248", "lastModified": "2024-11-21T01:44:19.813", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.440", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86025" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79069" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5249", "lastModified": "2024-11-21T01:44:19.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.487", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86026" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79070" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE diferentes a corrupci\u00f3n de memoria en Flash Player diferente listada como APSB12-22." } ], "id": "CVE-2012-5269", "lastModified": "2024-11-21T01:44:22.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.313", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86046" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79090" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de corrupci\u00f3n de memoria en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5265", "lastModified": "2024-11-21T01:44:22.100", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.157", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86042" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79086" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-03-05 21:55
Modified
2024-11-21 01:35
Severity ?
Summary
Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x does not properly handle integers, which allows attackers to obtain sensitive information via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "8185D9B3-EBCE-4341-8AA3-BA4CC4F4FAE7", "versionEndIncluding": "10.3.183.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:2:*:*:*:*:*:*:*", "matchCriteriaId": "8E735284-35A6-41C1-B1BC-3360901B4017", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:3:*:*:*:*:*:*:*", "matchCriteriaId": "610DB42B-E05B-4CD5-A516-71C30CA05CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:4:*:*:*:*:*:*:*", "matchCriteriaId": "9E1C6CCD-039A-4AB0-BFF3-8A894F8FEC14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:5:*:*:*:*:*:*:*", "matchCriteriaId": "D556A03C-E5A9-44BB-A777-2BF0FD628108", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6:*:*:*:*:*:*:*", "matchCriteriaId": "99A37266-4196-4E60-B099-8988979F9BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "7143E94B-F3CD-4E32-A7BB-C72C816EEACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "matchCriteriaId": "4654752C-F677-4066-8C48-BAD09392A594", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDFF4A51-C936-4C5B-8276-FD454C9E4F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5ECC9D7-3386-4FEA-9218-91E31FF90F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E81EA32-9621-4ACE-9191-2E9B8C24D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B0E10D6-6348-471B-918A-60AAE2AC5F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7FBE855-7EE3-46F2-9FA1-0366AC8C5D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "F0E93289-6EE0-401A-958D-F59D2CDAE2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", "matchCriteriaId": "A67FC00F-0C85-4DD7-81EA-65533EABC767", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "14E67AD7-0791-4D5D-A3B2-E173088B5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "EAF07696-9C85-470E-B608-1B0193CAFB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "matchCriteriaId": "0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0DC1B9D-686D-46A3-B9F4-DD4E078DF74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BC3ABBA-8B36-448D-883B-C675C202028A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", "matchCriteriaId": "EF2A52D9-0A1C-4E53-AFA2-148FF03D23A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "matchCriteriaId": "A82D5B56-44E0-4120-B73E-0A1155AF4B05", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E895107-ED8A-4F88-87C3-935EAE299C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", "matchCriteriaId": "1752F67C-75A9-4226-AB30-A94EB6C85526", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4007D621-A0BC-4927-82A7-10D73802BCF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "641776AE-5408-439E-8290-DD9324771874", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "138A932A-D775-46A2-86EC-3C03C96884C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5537E-3153-400D-9F9B-91E7F1218C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "32912721-F750-4C20-B999-E728F7D3A85D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "6693B1C4-B2A9-4725-AD0E-A266B9DF55AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "A95FA639-346C-491C-81A8-6C2A7B01AA19", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC7DD938-F963-4E03-B66B-F00436E4EA9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "351825F4-227D-4743-A74B-EAFC1034500B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2A0777F-22C2-4FD5-BE81-8982BE6874D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "92B377AF-2108-4D02-8FF9-2AA6165A0579", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "934A869D-D58D-4C36-B86E-013F62790585", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "59AF804B-BD7A-4AD7-AD44-B5D980443B8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "F5D52F86-2E38-4C66-9939-7603367B8D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "0557AA2A-FA3A-460A-8F03-DC74B149CA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "matchCriteriaId": "F22F1B02-CCF5-4770-A79B-1F58CA4321CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "matchCriteriaId": "93957171-F1F4-43ED-A8B9-2D36C81EB1F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "matchCriteriaId": "D50BF190-2629-49A8-A377-4723C93FFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD04F04C-30CE-4A8D-B254-B10DEF62CEEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "matchCriteriaId": "96DC7742-499D-4BF5-9C5B-FCFF912A9892", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDD0A103-6D00-4D3D-9570-2DF74B6FE294", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "matchCriteriaId": "33AC4365-576C-487A-89C5-197A26D416C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "matchCriteriaId": "84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0A9C054-1F82-41DD-BE13-2B71B6F87F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", "matchCriteriaId": "7CB0781E-D5B5-4576-ABD4-0EE1C0C3DF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE15288-9344-41ED-B574-6DC4A4DDE386", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.280:*:*:*:*:*:*:*", "matchCriteriaId": "EDC13ECD-4C49-48E3-A855-3DF8AAEACA74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", "matchCriteriaId": "84963C1D-06C1-4FBF-A3B8-EB14D2EB43DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE848097-01E6-4C9B-9593-282D55CC77D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10:*:*:*:*:*:*:*", "matchCriteriaId": "20349FB5-F30B-40EB-A5A0-219A935233B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "matchCriteriaId": "08E4028B-72E7-4E4A-AD0F-645F5AACAA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "matchCriteriaId": "BA646396-7C10-45A0-89A9-C75C5D8AFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "476BB487-150A-4482-8C84-E6A2995A97E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "matchCriteriaId": "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "matchCriteriaId": "60540FDE-8C31-4679-A85E-614B1EFE1FF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "matchCriteriaId": "AE652520-B693-47F1-A342-621C149A7430", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0EC3272-8E1E-4415-A254-BB6C7FB49BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E9A933E-5FBB-4E64-9166-7E56DE08E0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF5AF16-A4F2-4E65-ADA8-DE11BE1F198D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "matchCriteriaId": "F7DF88E7-1A67-447C-BCF8-5C5564002207", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "matchCriteriaId": "460A0D6C-3A06-4910-B1E5-375E12F64F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "matchCriteriaId": "950D8316-8117-4C09-A2A9-B34191957D32", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCC09395-A9C7-4D7F-9B55-3120A84CB427", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*", "matchCriteriaId": "33B7290A-8A7E-496D-95C4-DADA2821859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*", "matchCriteriaId": "05D97485-2C56-4B63-B105-BDB44E853210", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*", "matchCriteriaId": "E91594E8-5320-4B6A-A4D8-17BBF211A96E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*", "matchCriteriaId": "C3FD4968-B784-40D5-A09C-51F303A4C8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*", "matchCriteriaId": "D8314735-FF59-48CF-898B-95967B2856DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*", "matchCriteriaId": "3F52F734-0C14-4FE6-82C7-038C28383A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*", "matchCriteriaId": "8E007346-F45A-456F-BD0A-F3110A5854FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4664A826-4DCA-4C73-B550-7C98D24C20A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*", "matchCriteriaId": "11AEFEC9-5DB4-44CB-977D-6561DC1680C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*", "matchCriteriaId": "11AEFEC9-5DB4-44CB-977D-6561DC1680C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "A28D6675-799D-49BA-A350-8572124494EB", "versionEndIncluding": "11.1.111.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F921203-56C1-4B4E-A4A8-4A5CF5FF7F0D", "versionEndIncluding": "11.1.115.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x does not properly handle integers, which allows attackers to obtain sensitive information via unspecified vectors." }, { "lang": "es", "value": "Adobe Flash Player anterior a v10.3.183.16 y v11.x anteriores a v11.1.102.63 para Windows, Mac OS X, Linux, y Solaris; anteriores a v11.1.111.7 en Android v2.x y v3.x; y anteriores a v11.1.115.7 en Android v4.x no gestionan de forma adecuada n\u00fameros enteros, lo que permitir\u00eda a atacantes a obtener informaci\u00f3n sensible a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2012-0769", "lastModified": "2024-11-21T01:35:41.537", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-03-05T21:55:00.917", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/48819" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-05.html" }, { "source": "psirt@adobe.com", "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14828" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-05.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16212" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de corrupci\u00f3n de memoria en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5252", "lastModified": "2024-11-21T01:44:20.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.597", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86029" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79073" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5253", "lastModified": "2024-11-21T01:44:20.470", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.643", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86030" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79074" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de corrupci\u00f3n de memoria en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5263", "lastModified": "2024-11-21T01:44:21.793", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.047", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86040" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79084" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE diferentes a corrupci\u00f3n de memoria en Flash Player diferente listada como APSB12-22." } ], "id": "CVE-2012-5271", "lastModified": "2024-11-21T01:44:22.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.393", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86048" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79092" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE diferentes a corrupci\u00f3n de memoria en Flash Player diferente listada como APSB12-22." } ], "id": "CVE-2012-5268", "lastModified": "2024-11-21T01:44:22.497", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.267", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86045" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79089" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de corrupci\u00f3n de memoria en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5256", "lastModified": "2024-11-21T01:44:20.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.750", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86033" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79077" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-13 16:55
Modified
2024-11-21 01:49
Severity ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D", "versionEndIncluding": "11.6.602.171", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*", "matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*", "matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*", "matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*", "matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*", "matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*", "matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*", "matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*", "matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*", "matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*", "matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240", "versionEndIncluding": "11.2.202.273", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F", "versionEndIncluding": "3.6.0.599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*", "matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*", "matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en la pila en Adobe Flash Player v10.3.183.68 y antes v11.x antes v11.6.602.180 en Windows y Mac OS X, antes v10.3.183.68 y v11.x antes v11.2.202.275 en Linux, antes v11.1.111.44 en Android v2.x v3.x, y antes de v11.1.115.48 en Android v4.x, Adobe AIR v3.6.0.6090 antes; Adobe AIR SDK antes de v3.6.0.6090, y Adobe AIR SDK Compiler antes de v3.6.0.6090 que permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-1375", "lastModified": "2024-11-21T01:49:27.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-13T16:55:02.203", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "psirt@adobe.com", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "psirt@adobe.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de corrupci\u00f3n de memoria en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5266", "lastModified": "2024-11-21T01:44:22.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.190", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86043" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79087" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-13 16:55
Modified
2024-11-21 01:49
Severity ?
Summary
Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D", "versionEndIncluding": "11.6.602.171", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*", "matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*", "matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*", "matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*", "matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*", "matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*", "matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*", "matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*", "matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*", "matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*", "matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240", "versionEndIncluding": "11.2.202.273", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F", "versionEndIncluding": "3.6.0.599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*", "matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*", "matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "Adobe Flash Player v10.3.183.68 y v11.x antes de v11.6.602.180 en Windows y Mac OS X, antes de v10.3.183.68 y v11.x antes de v11.2.202.275 en Linux, antes de v11.1.111.44 en Android v2.x y v3.x y antes de v11.1.115.48 en Android 4.x, Adobe AIR v3.6.0.6090 antes; Adobe AIR SDK antes de v3.6.0.6090, y Adobe AIR SDK Compiler antes de v3.6.0.6090 que permiten a un atacante ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-1371", "lastModified": "2024-11-21T01:49:27.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-13T16:55:02.183", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "psirt@adobe.com", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "psirt@adobe.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5254", "lastModified": "2024-11-21T01:44:20.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.673", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86031" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79075" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-03-05 21:55
Modified
2024-11-21 01:35
Severity ?
Summary
The Matrix3D component in Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "8185D9B3-EBCE-4341-8AA3-BA4CC4F4FAE7", "versionEndIncluding": "10.3.183.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:2:*:*:*:*:*:*:*", "matchCriteriaId": "8E735284-35A6-41C1-B1BC-3360901B4017", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:3:*:*:*:*:*:*:*", "matchCriteriaId": "610DB42B-E05B-4CD5-A516-71C30CA05CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:4:*:*:*:*:*:*:*", "matchCriteriaId": "9E1C6CCD-039A-4AB0-BFF3-8A894F8FEC14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:5:*:*:*:*:*:*:*", "matchCriteriaId": "D556A03C-E5A9-44BB-A777-2BF0FD628108", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6:*:*:*:*:*:*:*", "matchCriteriaId": "99A37266-4196-4E60-B099-8988979F9BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "7143E94B-F3CD-4E32-A7BB-C72C816EEACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "matchCriteriaId": "4654752C-F677-4066-8C48-BAD09392A594", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDFF4A51-C936-4C5B-8276-FD454C9E4F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5ECC9D7-3386-4FEA-9218-91E31FF90F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E81EA32-9621-4ACE-9191-2E9B8C24D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B0E10D6-6348-471B-918A-60AAE2AC5F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7FBE855-7EE3-46F2-9FA1-0366AC8C5D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "F0E93289-6EE0-401A-958D-F59D2CDAE2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", "matchCriteriaId": "A67FC00F-0C85-4DD7-81EA-65533EABC767", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "14E67AD7-0791-4D5D-A3B2-E173088B5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "EAF07696-9C85-470E-B608-1B0193CAFB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "matchCriteriaId": "0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0DC1B9D-686D-46A3-B9F4-DD4E078DF74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BC3ABBA-8B36-448D-883B-C675C202028A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", "matchCriteriaId": "EF2A52D9-0A1C-4E53-AFA2-148FF03D23A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "matchCriteriaId": "A82D5B56-44E0-4120-B73E-0A1155AF4B05", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E895107-ED8A-4F88-87C3-935EAE299C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", "matchCriteriaId": "1752F67C-75A9-4226-AB30-A94EB6C85526", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4007D621-A0BC-4927-82A7-10D73802BCF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "641776AE-5408-439E-8290-DD9324771874", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "138A932A-D775-46A2-86EC-3C03C96884C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5537E-3153-400D-9F9B-91E7F1218C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "32912721-F750-4C20-B999-E728F7D3A85D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "6693B1C4-B2A9-4725-AD0E-A266B9DF55AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "A95FA639-346C-491C-81A8-6C2A7B01AA19", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC7DD938-F963-4E03-B66B-F00436E4EA9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "351825F4-227D-4743-A74B-EAFC1034500B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2A0777F-22C2-4FD5-BE81-8982BE6874D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "92B377AF-2108-4D02-8FF9-2AA6165A0579", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "934A869D-D58D-4C36-B86E-013F62790585", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "59AF804B-BD7A-4AD7-AD44-B5D980443B8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "F5D52F86-2E38-4C66-9939-7603367B8D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "0557AA2A-FA3A-460A-8F03-DC74B149CA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "matchCriteriaId": "F22F1B02-CCF5-4770-A79B-1F58CA4321CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "matchCriteriaId": "93957171-F1F4-43ED-A8B9-2D36C81EB1F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "matchCriteriaId": "D50BF190-2629-49A8-A377-4723C93FFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD04F04C-30CE-4A8D-B254-B10DEF62CEEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "matchCriteriaId": "96DC7742-499D-4BF5-9C5B-FCFF912A9892", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDD0A103-6D00-4D3D-9570-2DF74B6FE294", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "matchCriteriaId": "33AC4365-576C-487A-89C5-197A26D416C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "matchCriteriaId": "84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0A9C054-1F82-41DD-BE13-2B71B6F87F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", "matchCriteriaId": "7CB0781E-D5B5-4576-ABD4-0EE1C0C3DF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE15288-9344-41ED-B574-6DC4A4DDE386", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.280:*:*:*:*:*:*:*", "matchCriteriaId": "EDC13ECD-4C49-48E3-A855-3DF8AAEACA74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", "matchCriteriaId": "84963C1D-06C1-4FBF-A3B8-EB14D2EB43DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE848097-01E6-4C9B-9593-282D55CC77D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10:*:*:*:*:*:*:*", "matchCriteriaId": "20349FB5-F30B-40EB-A5A0-219A935233B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "matchCriteriaId": "08E4028B-72E7-4E4A-AD0F-645F5AACAA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "matchCriteriaId": "BA646396-7C10-45A0-89A9-C75C5D8AFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "476BB487-150A-4482-8C84-E6A2995A97E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "matchCriteriaId": "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "matchCriteriaId": "60540FDE-8C31-4679-A85E-614B1EFE1FF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "matchCriteriaId": "AE652520-B693-47F1-A342-621C149A7430", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0EC3272-8E1E-4415-A254-BB6C7FB49BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E9A933E-5FBB-4E64-9166-7E56DE08E0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF5AF16-A4F2-4E65-ADA8-DE11BE1F198D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "matchCriteriaId": "F7DF88E7-1A67-447C-BCF8-5C5564002207", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "matchCriteriaId": "460A0D6C-3A06-4910-B1E5-375E12F64F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "matchCriteriaId": "950D8316-8117-4C09-A2A9-B34191957D32", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCC09395-A9C7-4D7F-9B55-3120A84CB427", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*", "matchCriteriaId": "33B7290A-8A7E-496D-95C4-DADA2821859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*", "matchCriteriaId": "05D97485-2C56-4B63-B105-BDB44E853210", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*", "matchCriteriaId": "E91594E8-5320-4B6A-A4D8-17BBF211A96E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*", "matchCriteriaId": "C3FD4968-B784-40D5-A09C-51F303A4C8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*", "matchCriteriaId": "D8314735-FF59-48CF-898B-95967B2856DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*", "matchCriteriaId": "3F52F734-0C14-4FE6-82C7-038C28383A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*", "matchCriteriaId": "8E007346-F45A-456F-BD0A-F3110A5854FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4664A826-4DCA-4C73-B550-7C98D24C20A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*", "matchCriteriaId": "11AEFEC9-5DB4-44CB-977D-6561DC1680C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*", "matchCriteriaId": "11AEFEC9-5DB4-44CB-977D-6561DC1680C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "A28D6675-799D-49BA-A350-8572124494EB", "versionEndIncluding": "11.1.111.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F921203-56C1-4B4E-A4A8-4A5CF5FF7F0D", "versionEndIncluding": "11.1.115.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Matrix3D component in Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." }, { "lang": "es", "value": "El componente Matrix3D en Adobe Flash Player anterior a v10.3.183.16 y v11.x anterior a v11.1.102.63 en Windows, Mac OS X, Linux, y Solaris; anteriores a v11.1.111.7 en Android 2.x y 3.x; y anteriores a v11.1.115.7 en Android 4.x permite a atacantes ejecutar c\u00f3digo o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2012-0768", "lastModified": "2024-11-21T01:35:41.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-03-05T21:55:00.870", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/48819" }, { "source": "psirt@adobe.com", "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-05.html" }, { "source": "psirt@adobe.com", "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15058" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-05.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15922" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de corrupci\u00f3n de memoria en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5258", "lastModified": "2024-11-21T01:44:21.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.847", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86035" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79079" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-11-13 13:39
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*", "matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": false }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": false }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": false }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player anteriores a v10.3.183.29 y 11.x anteriores a v11.4.402.287 on Windows and Mac OS X, anteriores a v10.3.183.29 y v11.x anteriores a v11.2.202.243 en Linux, anteriores a v11.1.111.19 en Android v2.x y v3.x, y anteriores a v11.1.115.20 en Android v4.x; Adobe AIR anteriores a v3.4.0.2710; y Adobe AIR SDK anteriores a v3.4.0.2710 permite a atacantes ejecutar c\u00f3digo a trav\u00e9s de vectores no especificados, es una vulnerabilidad distinta a otros listados en APSB12-22." } ], "id": "CVE-2012-5286", "lastModified": "2024-11-21T01:44:24.357", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-11-13T13:39:47.140", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86875" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/56375" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79771" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5260", "lastModified": "2024-11-21T01:44:21.390", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.923", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86037" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79081" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79081" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-11-13 13:39
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*", "matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": false }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": false }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": false }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player anteriores a v10.3.183.29 y 11.x anteriores a v11.4.402.287 on Windows and Mac OS X, anteriores a v10.3.183.29 y v11.x anteriores a v11.2.202.243 en Linux, anteriores a v11.1.111.19 en Android v2.x y v3.x, y anteriores a v11.1.115.20 en Android v4.x; Adobe AIR anteriores a v3.4.0.2710; y Adobe AIR SDK anteriores a v3.4.0.2710 permite a atacantes ejecutar c\u00f3digo a trav\u00e9s de vectores no especificados, es una vulnerabilidad distinta a otros listados en APSB12-22." } ], "id": "CVE-2012-5287", "lastModified": "2024-11-21T01:44:24.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-11-13T13:39:47.187", "references": [ { "source": "psirt@adobe.com", "url": "http://osvdb.org/86876" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/56376" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79772" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5251", "lastModified": "2024-11-21T01:44:20.203", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.563", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86028" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79072" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE diferentes a corrupci\u00f3n de memoria en Flash Player diferente listada como APSB12-22." } ], "id": "CVE-2012-5267", "lastModified": "2024-11-21T01:44:22.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.237", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86044" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79088" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." }, { "lang": "es", "value": "Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE diferentes a corrupci\u00f3n de memoria en Flash Player diferente listada como APSB12-22." } ], "id": "CVE-2012-5270", "lastModified": "2024-11-21T01:44:22.763", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:11.347", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79091" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-31 19:55
Modified
2024-11-21 01:42
Severity ?
Summary
Adobe Flash Player before 10.3.183.23 and 11.x before 11.4.402.265 on Windows and Mac OS X, before 10.3.183.23 and 11.x before 11.2.202.238 on Linux, before 11.1.111.16 on Android 2.x and 3.x, and before 11.1.115.17 on Android 4.x; Adobe AIR before 3.4.0.2540; and Adobe AIR SDK before 3.4.0.2540 allow attackers to cause a denial of service (application crash) by leveraging a logic error during handling of Firefox dialogs.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "870A2330-52EE-4895-953A-8984DD043C68", "versionEndIncluding": "3.3.0.3670", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D57A0BA-3889-4848-AAAC-9D5D7CF74837", "versionEndIncluding": "3.3.0.3690", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "17696C9F-CE9E-4E40-96B5-9B83A2481A3C", "versionEndIncluding": "11.1.111.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F813E31C-9B2D-49AC-934B-3229F4976379", "versionEndIncluding": "10.3.183.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:2:*:*:*:*:*:*:*", "matchCriteriaId": "8E735284-35A6-41C1-B1BC-3360901B4017", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:3:*:*:*:*:*:*:*", "matchCriteriaId": "610DB42B-E05B-4CD5-A516-71C30CA05CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:4:*:*:*:*:*:*:*", "matchCriteriaId": "9E1C6CCD-039A-4AB0-BFF3-8A894F8FEC14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:5:*:*:*:*:*:*:*", "matchCriteriaId": "D556A03C-E5A9-44BB-A777-2BF0FD628108", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6:*:*:*:*:*:*:*", "matchCriteriaId": "99A37266-4196-4E60-B099-8988979F9BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "7143E94B-F3CD-4E32-A7BB-C72C816EEACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "matchCriteriaId": "4654752C-F677-4066-8C48-BAD09392A594", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDFF4A51-C936-4C5B-8276-FD454C9E4F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5ECC9D7-3386-4FEA-9218-91E31FF90F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E81EA32-9621-4ACE-9191-2E9B8C24D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B0E10D6-6348-471B-918A-60AAE2AC5F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7FBE855-7EE3-46F2-9FA1-0366AC8C5D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "F0E93289-6EE0-401A-958D-F59D2CDAE2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", "matchCriteriaId": "A67FC00F-0C85-4DD7-81EA-65533EABC767", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "14E67AD7-0791-4D5D-A3B2-E173088B5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "EAF07696-9C85-470E-B608-1B0193CAFB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "matchCriteriaId": "0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0DC1B9D-686D-46A3-B9F4-DD4E078DF74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BC3ABBA-8B36-448D-883B-C675C202028A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", "matchCriteriaId": "EF2A52D9-0A1C-4E53-AFA2-148FF03D23A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "matchCriteriaId": "A82D5B56-44E0-4120-B73E-0A1155AF4B05", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E895107-ED8A-4F88-87C3-935EAE299C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", "matchCriteriaId": "1752F67C-75A9-4226-AB30-A94EB6C85526", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4007D621-A0BC-4927-82A7-10D73802BCF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "641776AE-5408-439E-8290-DD9324771874", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "138A932A-D775-46A2-86EC-3C03C96884C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5537E-3153-400D-9F9B-91E7F1218C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "32912721-F750-4C20-B999-E728F7D3A85D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "6693B1C4-B2A9-4725-AD0E-A266B9DF55AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "A95FA639-346C-491C-81A8-6C2A7B01AA19", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC7DD938-F963-4E03-B66B-F00436E4EA9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "351825F4-227D-4743-A74B-EAFC1034500B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2A0777F-22C2-4FD5-BE81-8982BE6874D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "AA8E58B1-D5B8-406F-BFD7-6244A1D2560E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "92B377AF-2108-4D02-8FF9-2AA6165A0579", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "934A869D-D58D-4C36-B86E-013F62790585", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "59AF804B-BD7A-4AD7-AD44-B5D980443B8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "F5D52F86-2E38-4C66-9939-7603367B8D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "0557AA2A-FA3A-460A-8F03-DC74B149CA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "matchCriteriaId": "F22F1B02-CCF5-4770-A79B-1F58CA4321CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "matchCriteriaId": "93957171-F1F4-43ED-A8B9-2D36C81EB1F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "matchCriteriaId": "D50BF190-2629-49A8-A377-4723C93FFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD04F04C-30CE-4A8D-B254-B10DEF62CEEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "matchCriteriaId": "96DC7742-499D-4BF5-9C5B-FCFF912A9892", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDD0A103-6D00-4D3D-9570-2DF74B6FE294", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "matchCriteriaId": "33AC4365-576C-487A-89C5-197A26D416C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "matchCriteriaId": "84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0A9C054-1F82-41DD-BE13-2B71B6F87F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", "matchCriteriaId": "7CB0781E-D5B5-4576-ABD4-0EE1C0C3DF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE15288-9344-41ED-B574-6DC4A4DDE386", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.280:*:*:*:*:*:*:*", "matchCriteriaId": "EDC13ECD-4C49-48E3-A855-3DF8AAEACA74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", "matchCriteriaId": "84963C1D-06C1-4FBF-A3B8-EB14D2EB43DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE848097-01E6-4C9B-9593-282D55CC77D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "matchCriteriaId": "08E4028B-72E7-4E4A-AD0F-645F5AACAA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.2.54:*:*:*:*:*:*:*", "matchCriteriaId": "86F5FDD3-A16E-4EE9-BDCD-49E206BE6BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "matchCriteriaId": "BA646396-7C10-45A0-89A9-C75C5D8AFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "476BB487-150A-4482-8C84-E6A2995A97E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "matchCriteriaId": "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "matchCriteriaId": "60540FDE-8C31-4679-A85E-614B1EFE1FF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "matchCriteriaId": "AE652520-B693-47F1-A342-621C149A7430", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0EC3272-8E1E-4415-A254-BB6C7FB49BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E9A933E-5FBB-4E64-9166-7E56DE08E0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14:*:*:*:*:*:*:*", "matchCriteriaId": "1CCE0A16-AA72-44B2-A2E5-567A1B37D8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF5AF16-A4F2-4E65-ADA8-DE11BE1F198D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "matchCriteriaId": "F7DF88E7-1A67-447C-BCF8-5C5564002207", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "matchCriteriaId": "460A0D6C-3A06-4910-B1E5-375E12F64F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "matchCriteriaId": "950D8316-8117-4C09-A2A9-B34191957D32", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCC09395-A9C7-4D7F-9B55-3120A84CB427", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*", "matchCriteriaId": "33B7290A-8A7E-496D-95C4-DADA2821859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*", "matchCriteriaId": "05D97485-2C56-4B63-B105-BDB44E853210", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "B665AEB6-7886-4C20-80F5-2688379E1C36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*", "matchCriteriaId": "E91594E8-5320-4B6A-A4D8-17BBF211A96E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*", "matchCriteriaId": "C3FD4968-B784-40D5-A09C-51F303A4C8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*", "matchCriteriaId": "D8314735-FF59-48CF-898B-95967B2856DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*", "matchCriteriaId": "3F52F734-0C14-4FE6-82C7-038C28383A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*", "matchCriteriaId": "8E007346-F45A-456F-BD0A-F3110A5854FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4664A826-4DCA-4C73-B550-7C98D24C20A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*", "matchCriteriaId": "1C2E61C2-6640-43AC-B435-17DD1DD68C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "F813E31C-9B2D-49AC-934B-3229F4976379", "versionEndIncluding": "10.3.183.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:2:*:*:*:*:*:*:*", "matchCriteriaId": "8E735284-35A6-41C1-B1BC-3360901B4017", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:3:*:*:*:*:*:*:*", "matchCriteriaId": "610DB42B-E05B-4CD5-A516-71C30CA05CAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:4:*:*:*:*:*:*:*", "matchCriteriaId": "9E1C6CCD-039A-4AB0-BFF3-8A894F8FEC14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:5:*:*:*:*:*:*:*", "matchCriteriaId": "D556A03C-E5A9-44BB-A777-2BF0FD628108", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6:*:*:*:*:*:*:*", "matchCriteriaId": "99A37266-4196-4E60-B099-8988979F9BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "7143E94B-F3CD-4E32-A7BB-C72C816EEACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "matchCriteriaId": "4654752C-F677-4066-8C48-BAD09392A594", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDFF4A51-C936-4C5B-8276-FD454C9E4F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5ECC9D7-3386-4FEA-9218-91E31FF90F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E81EA32-9621-4ACE-9191-2E9B8C24D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B0E10D6-6348-471B-918A-60AAE2AC5F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7FBE855-7EE3-46F2-9FA1-0366AC8C5D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "F0E93289-6EE0-401A-958D-F59D2CDAE2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", "matchCriteriaId": "A67FC00F-0C85-4DD7-81EA-65533EABC767", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "14E67AD7-0791-4D5D-A3B2-E173088B5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "EAF07696-9C85-470E-B608-1B0193CAFB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "matchCriteriaId": "0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0DC1B9D-686D-46A3-B9F4-DD4E078DF74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BC3ABBA-8B36-448D-883B-C675C202028A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", "matchCriteriaId": "EF2A52D9-0A1C-4E53-AFA2-148FF03D23A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "matchCriteriaId": "A82D5B56-44E0-4120-B73E-0A1155AF4B05", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E895107-ED8A-4F88-87C3-935EAE299C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", "matchCriteriaId": "1752F67C-75A9-4226-AB30-A94EB6C85526", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4007D621-A0BC-4927-82A7-10D73802BCF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "641776AE-5408-439E-8290-DD9324771874", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "138A932A-D775-46A2-86EC-3C03C96884C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5537E-3153-400D-9F9B-91E7F1218C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "32912721-F750-4C20-B999-E728F7D3A85D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "6693B1C4-B2A9-4725-AD0E-A266B9DF55AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "A95FA639-346C-491C-81A8-6C2A7B01AA19", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC7DD938-F963-4E03-B66B-F00436E4EA9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "351825F4-227D-4743-A74B-EAFC1034500B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2A0777F-22C2-4FD5-BE81-8982BE6874D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "AA8E58B1-D5B8-406F-BFD7-6244A1D2560E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "92B377AF-2108-4D02-8FF9-2AA6165A0579", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "934A869D-D58D-4C36-B86E-013F62790585", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "59AF804B-BD7A-4AD7-AD44-B5D980443B8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "F5D52F86-2E38-4C66-9939-7603367B8D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "0557AA2A-FA3A-460A-8F03-DC74B149CA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "matchCriteriaId": "F22F1B02-CCF5-4770-A79B-1F58CA4321CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "matchCriteriaId": "93957171-F1F4-43ED-A8B9-2D36C81EB1F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "matchCriteriaId": "D50BF190-2629-49A8-A377-4723C93FFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD04F04C-30CE-4A8D-B254-B10DEF62CEEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "matchCriteriaId": "96DC7742-499D-4BF5-9C5B-FCFF912A9892", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDD0A103-6D00-4D3D-9570-2DF74B6FE294", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "matchCriteriaId": "33AC4365-576C-487A-89C5-197A26D416C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "matchCriteriaId": "84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0A9C054-1F82-41DD-BE13-2B71B6F87F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", "matchCriteriaId": "7CB0781E-D5B5-4576-ABD4-0EE1C0C3DF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE15288-9344-41ED-B574-6DC4A4DDE386", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.280:*:*:*:*:*:*:*", "matchCriteriaId": "EDC13ECD-4C49-48E3-A855-3DF8AAEACA74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", "matchCriteriaId": "84963C1D-06C1-4FBF-A3B8-EB14D2EB43DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE848097-01E6-4C9B-9593-282D55CC77D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "matchCriteriaId": "08E4028B-72E7-4E4A-AD0F-645F5AACAA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.2.54:*:*:*:*:*:*:*", "matchCriteriaId": "86F5FDD3-A16E-4EE9-BDCD-49E206BE6BF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "matchCriteriaId": "BA646396-7C10-45A0-89A9-C75C5D8AFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "476BB487-150A-4482-8C84-E6A2995A97E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "matchCriteriaId": "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "matchCriteriaId": "60540FDE-8C31-4679-A85E-614B1EFE1FF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "matchCriteriaId": "AE652520-B693-47F1-A342-621C149A7430", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0EC3272-8E1E-4415-A254-BB6C7FB49BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E9A933E-5FBB-4E64-9166-7E56DE08E0D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14:*:*:*:*:*:*:*", "matchCriteriaId": "1CCE0A16-AA72-44B2-A2E5-567A1B37D8FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF5AF16-A4F2-4E65-ADA8-DE11BE1F198D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "matchCriteriaId": "F7DF88E7-1A67-447C-BCF8-5C5564002207", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "matchCriteriaId": "460A0D6C-3A06-4910-B1E5-375E12F64F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "matchCriteriaId": "950D8316-8117-4C09-A2A9-B34191957D32", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCC09395-A9C7-4D7F-9B55-3120A84CB427", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*", "matchCriteriaId": "33B7290A-8A7E-496D-95C4-DADA2821859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*", "matchCriteriaId": "05D97485-2C56-4B63-B105-BDB44E853210", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "B665AEB6-7886-4C20-80F5-2688379E1C36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*", "matchCriteriaId": "E91594E8-5320-4B6A-A4D8-17BBF211A96E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*", "matchCriteriaId": "C3FD4968-B784-40D5-A09C-51F303A4C8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*", "matchCriteriaId": "D8314735-FF59-48CF-898B-95967B2856DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*", "matchCriteriaId": "3F52F734-0C14-4FE6-82C7-038C28383A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*", "matchCriteriaId": "8E007346-F45A-456F-BD0A-F3110A5854FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4664A826-4DCA-4C73-B550-7C98D24C20A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*", "matchCriteriaId": "1C2E61C2-6640-43AC-B435-17DD1DD68C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*", "matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC07DC78-3C12-4D7D-B69A-2F78FDB412E6", "versionEndIncluding": "11.1.115.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.6:*:*:*:*:*:*:*", "matchCriteriaId": "30C7A3D1-0F5E-447E-B6E2-E0144AD2E123", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.23 and 11.x before 11.4.402.265 on Windows and Mac OS X, before 10.3.183.23 and 11.x before 11.2.202.238 on Linux, before 11.1.111.16 on Android 2.x and 3.x, and before 11.1.115.17 on Android 4.x; Adobe AIR before 3.4.0.2540; and Adobe AIR SDK before 3.4.0.2540 allow attackers to cause a denial of service (application crash) by leveraging a logic error during handling of Firefox dialogs." }, { "lang": "es", "value": "Adobe Flash Player anterior a v10.3.183.23 y v11.x anterior a v11.4.402.265 en Windows y Mac OS X, anterior a v10.3.183.23 y v11.x anterior a v11.2.202.238 en Linux, anterior a v11.1.111.16 en Android 2.x y 3.x y anterior a v11.1.115.17 en Android 4.x, Adobe AIR anterior a v3.4.0.2540, y Adobe AIR SDK anterior a v3.4.0.2540, permite a un atacante provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) al aprovechar un error de l\u00f3gica en el manejo de los di\u00e1logos de Firefox." } ], "id": "CVE-2012-4171", "lastModified": "2024-11-21T01:42:19.157", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-31T19:55:01.230", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/55365" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/55365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78226" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-01-11 22:55
Modified
2024-11-21 01:47
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "777CB526-C6E2-4245-84AF-04B345861E6E", "versionEndIncluding": "10.3.183.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*", "matchCriteriaId": "1C2E61C2-6640-43AC-B435-17DD1DD68C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.19:*:*:*:*:*:*:*", "matchCriteriaId": "E60C0475-10A5-44DD-9E7B-CA17A5BAB5FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.25:*:*:*:*:*:*:*", "matchCriteriaId": "74E1F5D3-7DBA-400A-A335-54C22EFF8796", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.29:*:*:*:*:*:*:*", "matchCriteriaId": "C055FA74-E573-4C82-BAEA-17BD3032DA42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.43:*:*:*:*:*:*:*", "matchCriteriaId": "555E97A6-F1BA-4A7D-AD0C-DB737D16500B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "62E0EB75-6B39-429C-957F-67234FD1D136", "versionEndIncluding": "11.5.502.136", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*", "matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*", "matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "308B155D-8C66-4853-A1E8-573D87176C84", "versionEndIncluding": "11.2.202.258", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F92764B-9428-48EA-8498-13F25CF583B8", "versionEndIncluding": "11.1.115.34", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.6:*:*:*:*:*:*:*", "matchCriteriaId": "30C7A3D1-0F5E-447E-B6E2-E0144AD2E123", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.17:*:*:*:*:*:*:*", "matchCriteriaId": "B81AAB75-C6A9-4772-8E55-0A16B7C3C151", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.20:*:*:*:*:*:*:*", "matchCriteriaId": "D2948D0F-39E5-48F1-80CA-E50A7BFA66D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.27:*:*:*:*:*:*:*", "matchCriteriaId": "FF0FDD57-C951-40DE-A7C8-BCD04EBB5C7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "F14E1C39-6242-4D12-8AD4-26867392CF44", "versionEndIncluding": "11.1.111.29", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "82F8205F-2B68-4F1D-B417-76C1AB99FDFA", "versionEndIncluding": "3.5.0.890", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "1ACC36DC-87D2-442A-8D70-8AE467738A8C", "versionEndIncluding": "3.5.0.890", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player anteriores a v10.3.183.50 y 11.x anteriores a v11.5.502.146 en Windows y Mac OS X, anteriores a v10.3.183.50 y 11.x anteriores a v11.2.202.261 en Linux, anteriores a v11.1.111.31 en Android 2.x y 3.x, y anteriores a v11.1.115.36 en Android 4.x; Adobe AIR anteriores a v3.5.0.1060; y Adobe AIR SDK anteriores a v3.5.0.1060 permite a atacantes remotos a ejecutar c\u00f3digo a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-0630", "lastModified": "2024-11-21T01:47:54.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-01-11T22:55:01.400", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html" }, { "source": "psirt@adobe.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0149.html" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0149.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-01.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-03-13 16:55
Modified
2024-11-21 01:47
Severity ?
Summary
Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABC43592-4D0D-476E-91B4-B89DB253A22D", "versionEndIncluding": "11.6.602.171", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*", "matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.270:*:*:*:*:*:*:*", "matchCriteriaId": "67262486-1D8D-4884-B113-E3034DEC70B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.287:*:*:*:*:*:*:*", "matchCriteriaId": "AF945BB2-BEC0-4CC6-B08E-A2A5D0863CCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*", "matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*", "matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.136:*:*:*:*:*:*:*", "matchCriteriaId": "1C176471-3B36-45BE-899D-6BF63168B038", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.146:*:*:*:*:*:*:*", "matchCriteriaId": "6D92F6D4-8562-4824-91C9-136318AEFFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.149:*:*:*:*:*:*:*", "matchCriteriaId": "03692AB9-66BC-49CF-930C-48ABDE852159", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.167:*:*:*:*:*:*:*", "matchCriteriaId": "85AC9C3B-D8A6-4DAF-9DA9-787F28D5953A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.6.602.168:*:*:*:*:*:*:*", "matchCriteriaId": "ABB61883-0A88-406C-B955-484096D4468D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E925C6C8-A2D9-4215-ABB2-85331817C240", "versionEndIncluding": "11.2.202.273", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F0B0F1E-EFA6-40AA-9843-03DA0E257333", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:x64:*", "matchCriteriaId": "EB983FF4-2BC2-43CB-AE94-87D63CFB27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "E132DC80-DE83-43B1-930E-7BA0E823BBD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D7004E6-9992-4ED4-8EDC-7443260A7488", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:x64:*", "matchCriteriaId": "A848548C-C6FC-488E-9E9D-ACF68284D78E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "D7E37677-1180-4EA7-AF8E-8F22178F6D30", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "91D33ADE-4DBA-4C5F-8D0E-FE97D563AAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "007C1BC2-29DC-4FCD-97F2-823CA9E3DE42", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "38D557B0-8928-4661-BB3B-4682432460E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "AA3726C7-275A-4B91-874F-224C1AB2DF2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F340330-880B-4F92-B8C3-8CF8E8178075", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.34:*:*:*:*:*:*:*", "matchCriteriaId": "2C7385A0-9747-45BF-8394-0C9D85AA2D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.115.36:*:*:*:*:*:*:*", "matchCriteriaId": "9E0F7FD8-9A14-4C90-ABDD-60533AE2DFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "19AC2959-258C-47A0-8C1D-294678599353", "versionEndIncluding": "11.1.111.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*", "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*", "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*", "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*", "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.29:*:*:*:*:*:*:*", "matchCriteriaId": "7523F253-BC9E-409F-8D3C-CF0AC5CF5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.31:*:*:*:*:*:*:*", "matchCriteriaId": "36B483E9-FDB3-43E9-82B4-B5F5DB189A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.32:*:*:*:*:*:*:*", "matchCriteriaId": "89CD941D-63FB-4DC4-B051-838E006FB07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk_and_compiler:*:*:*:*:*:*:*:*", "matchCriteriaId": "82622975-F454-4669-935D-57AA58C3755F", "versionEndIncluding": "3.6.0.599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5210ABB-58EC-4317-A773-6F3BE4361120", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "D6C2C793-2B16-4C9A-B66A-C2FF5C6F98F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "BCB421A8-396B-4538-B0AF-24317DFD5F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "63AF12F4-1E39-44CD-B69D-C97B0413F88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3650:*:*:*:*:*:*:*", "matchCriteriaId": "C19B1D6C-3556-437F-A222-6EE0B97C87C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.3.0.3690:*:*:*:*:*:*:*", "matchCriteriaId": "2EFDD729-7248-4A49-AB8E-1B4FDAFF7B21", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "0E660DFC-095E-44CE-8A79-32932FB73AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "AA5193A4-5D94-4D67-AC2B-25BA6C91156F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "F44AA947-454F-4CAB-A5F4-8CC91A51588A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "3A6EDDBC-062E-47FD-88C8-BA5E1B0550AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "04F8EB6C-A94C-4248-A899-61EBC0F46DD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB208733-4C5C-40FD-87FD-494EFEC5CBE2", "versionEndIncluding": "3.6.0.597", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2540:*:*:*:*:*:*:*", "matchCriteriaId": "C841DF37-4605-4659-AB06-BCA266B60C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.4.0.2710:*:*:*:*:*:*:*", "matchCriteriaId": "DFE45EDE-0088-4824-84AD-118F37CFCC87", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*", "matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*", "matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.890:*:*:*:*:*:*:*", "matchCriteriaId": "2F189C1D-9A0F-48C6-AB4B-463BD65A2487", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.1060:*:*:*:*:*:*:*", "matchCriteriaId": "4426B817-A4F7-40C6-A40A-367334C31008", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad Use-after-free en Adobe Flash Player antes de v10.3.183.68 y v11.x antes v11.6.602.180 en Windows y Mac OS X, antes de v10.3.183.68 y v11.x antes de v11.2.202.275 en Linux, antes de v11.1.111.44 en Android v2.x y v3.x, y antes de v11.1.115.48 en Android v4.x, Adobe AIR antes de v3.6.0.6090; Adobe AIR SDK antes de v3.6.0.6090, y Adobe AIR SDK Compiler antes de v3.6.0.6090 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2013-0650", "lastModified": "2024-11-21T01:47:56.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-13T16:55:02.163", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "psirt@adobe.com", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "psirt@adobe.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5250", "lastModified": "2024-11-21T01:44:20.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.517", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86027" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79071" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-09 11:13
Modified
2024-11-21 01:44
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*", "matchCriteriaId": "639AA6CC-A131-412F-8AC8-010ED2A57CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*", "matchCriteriaId": "965C8355-F2FA-4C47-9C74-C8480A93D1D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*", "matchCriteriaId": "8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*", "matchCriteriaId": "AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*", "matchCriteriaId": "B284F980-D84B-441A-A763-141935512562", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*", "matchCriteriaId": "82A959FA-0AD2-4BF3-8443-7C8EFB89F55B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*", "matchCriteriaId": "17796147-244A-40BD-8594-24D8E61C78E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*", "matchCriteriaId": "C2F2AAB3-3776-46B4-B149-8CFD884F21C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE", "versionEndIncluding": "10.3.183.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*", "matchCriteriaId": "D971B98A-2E97-4437-A7F1-3795E360565F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*", "matchCriteriaId": "A088CEA6-9871-4A4D-9139-EF241D0B9D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*", "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*", "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*", "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*", "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*", "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*", "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*", "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*", "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*", "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*", "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "5DF4105C-162A-4523-8DE3-1CCF57F25F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*", "matchCriteriaId": "D05546BB-7EE7-4202-8A55-D413C1BE6D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*", "matchCriteriaId": "855B89AA-87DA-415F-8D63-E2DBC9C28FC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*", "matchCriteriaId": "7E04E602-4ABA-49C8-89BB-682F62A99A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "367CC931-220D-457A-B8FF-2CB8C8AB8873", "versionEndIncluding": "11.1.111.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*", "matchCriteriaId": "06EA028F-6825-47FE-A3A4-44BA04C4FA48", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4A00F228-08B0-436B-AD52-5858EE05AAAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*", "matchCriteriaId": "710D2421-9AE0-406F-B188-048E3B2F995C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*", "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*", "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*", "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*", "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*", "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*", "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*", "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*", "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*", "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABF400D3-49DA-44DD-84B3-62D414189A5F", "versionEndIncluding": "11.1.115.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*", "matchCriteriaId": "CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*", "matchCriteriaId": "A89AD347-0366-4414-9DE1-65CE9B6EE860", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*", "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*", "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*", "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFF4DE5-6120-4AD1-8097-AB46E94533F6", "versionEndIncluding": "3.4.0.2540", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F180F403-7032-497F-955B-0CB1D5CA3A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*", "matchCriteriaId": "18225F85-A8A0-4C0F-AF7B-1B90D32F63DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*", "matchCriteriaId": "B822E580-99C8-4E82-BBDA-9D6973545195", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*", "matchCriteriaId": "267E63D6-18CA-48CD-8C6E-B88F22C94315", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E50A13-564F-4CE7-8335-B99B83AA0B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*", "matchCriteriaId": "81DFD4AA-0921-4144-A782-1FA110A54214", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "matchCriteriaId": "0D551FDD-F7FC-4F9A-9A07-A5091E15774B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*", "matchCriteriaId": "FCD82FA6-9DF9-4F66-9FA7-D5A75B848529", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*", "matchCriteriaId": "4837C443-B6C8-49AC-9E1D-B10FD69B2847", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*", "matchCriteriaId": "D3A6BA4F-1963-4E66-AD6E-67529325675B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*", "matchCriteriaId": "FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*", "matchCriteriaId": "91B8188C-C862-4BE9-9D23-09DDF3CA2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*", "matchCriteriaId": "2A2272A4-2245-4133-AA29-7BF160DA07AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*", "matchCriteriaId": "5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*", "matchCriteriaId": "B20057F4-CE36-431F-9E30-5A103919711C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*", "matchCriteriaId": "6270B475-2B46-4194-9A49-3223F92A215C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*", "matchCriteriaId": "153D7B82-22F4-48A8-8AFD-8829203C1F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2EC01657-8106-41A5-B862-70E68C0B4C14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*", "matchCriteriaId": "018ADC69-4B32-4AA2-89C3-69003050EA4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD92B4-7378-49FF-BF99-861A0F186573", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*", "matchCriteriaId": "029709CE-7DF8-45F5-9A81-E0F2A389CD62", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*", "matchCriteriaId": "077126E8-3F60-48A9-B77A-58B254DFBA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*", "matchCriteriaId": "08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*", "matchCriteriaId": "2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*", "matchCriteriaId": "3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*", "matchCriteriaId": "04E13B92-56AD-41B5-9BBB-E6C4088277DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A511378-ACDB-4C31-9B84-2A25568EDC7E", "versionEndIncluding": "3.4.0.2540", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22." } ], "id": "CVE-2012-5259", "lastModified": "2024-11-21T01:44:21.250", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-10-09T11:13:10.893", "references": [ { "source": "psirt@adobe.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/86036" }, { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/86036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79080" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2012-5271
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79092 | vdb-entry, x_refsource_XF | |
http://osvdb.org/86048 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125271-code-exec(79092)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79092" }, { "name": "86048", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86048" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125271-code-exec(79092)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79092" }, { "name": "86048", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86048" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5271", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125271-code-exec(79092)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79092" }, { "name": "86048", "refsource": "OSVDB", "url": "http://osvdb.org/86048" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5271", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5260
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86037 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79081 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86037", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86037" }, { "name": "adobe-cve20125260-bo(79081)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79081" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86037", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86037" }, { "name": "adobe-cve20125260-bo(79081)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79081" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5260", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86037", "refsource": "OSVDB", "url": "http://osvdb.org/86037" }, { "name": "adobe-cve20125260-bo(79081)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79081" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5260", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0650
Vulnerability from cvelistv5
Published
2013-03-13 10:00
Modified
2024-08-06 14:33
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb13-09.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html | vendor-advisory, x_refsource_SUSE | |
http://marc.info/?l=bugtraq&m=139455789818399&w=2 | vendor-advisory, x_refsource_HP | |
http://rhn.redhat.com/errata/RHSA-2013-0643.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-17T13:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-0650", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0464", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-09.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-0650", "datePublished": "2013-03-13T10:00:00", "dateReserved": "2012-12-18T00:00:00", "dateUpdated": "2024-08-06T14:33:05.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0630
Vulnerability from cvelistv5
Published
2013-01-11 22:00
Modified
2024-08-06 14:33
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2013-0149.html | vendor-advisory, x_refsource_REDHAT | |
http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb13-01.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.207Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0168", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html" }, { "name": "openSUSE-SU-2013:0121", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html" }, { "name": "SUSE-SU-2013:0033", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html" }, { "name": "RHSA-2013:0149", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0149.html" }, { "name": "openSUSE-SU-2013:0364", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html" }, { "name": "openSUSE-SU-2013:0128", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-01.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-01-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-07T10:00:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0168", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html" }, { "name": "openSUSE-SU-2013:0121", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html" }, { "name": "SUSE-SU-2013:0033", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html" }, { "name": "RHSA-2013:0149", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0149.html" }, { "name": "openSUSE-SU-2013:0364", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html" }, { "name": "openSUSE-SU-2013:0128", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-01.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-0630", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0168", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html" }, { "name": "openSUSE-SU-2013:0121", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html" }, { "name": "SUSE-SU-2013:0033", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html" }, { "name": "RHSA-2013:0149", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0149.html" }, { "name": "openSUSE-SU-2013:0364", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html" }, { "name": "openSUSE-SU-2013:0128", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-01.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-0630", "datePublished": "2013-01-11T22:00:00", "dateReserved": "2012-12-18T00:00:00", "dateUpdated": "2024-08-06T14:33:05.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1375
Vulnerability from cvelistv5
Published
2013-03-13 10:00
Modified
2024-08-06 14:57
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb13-09.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html | vendor-advisory, x_refsource_SUSE | |
http://marc.info/?l=bugtraq&m=139455789818399&w=2 | vendor-advisory, x_refsource_HP | |
http://rhn.redhat.com/errata/RHSA-2013-0643.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.056Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-17T13:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1375", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0464", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-09.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1375", "datePublished": "2013-03-13T10:00:00", "dateReserved": "2013-01-16T00:00:00", "dateUpdated": "2024-08-06T14:57:05.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5248
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86025 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79069 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86025", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86025" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125248-bo(79069)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79069" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86025", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86025" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125248-bo(79069)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79069" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5248", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86025", "refsource": "OSVDB", "url": "http://osvdb.org/86025" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125248-bo(79069)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79069" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5248", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5252
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79073 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
http://osvdb.org/86029 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.422Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125252-code-exec(79073)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79073" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86029", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86029" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125252-code-exec(79073)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79073" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86029", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86029" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5252", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125252-code-exec(79073)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79073" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86029", "refsource": "OSVDB", "url": "http://osvdb.org/86029" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5252", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.422Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5272
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
http://osvdb.org/86049 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86049", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-11-23T20:12:41", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86049", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86049" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86049", "refsource": "OSVDB", "url": "http://osvdb.org/86049" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5272", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5261
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86038 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79082 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.428Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86038", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86038" }, { "name": "adobe-cve20125261-code-exec(79082)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79082" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86038", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86038" }, { "name": "adobe-cve20125261-code-exec(79082)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79082" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5261", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86038", "refsource": "OSVDB", "url": "http://osvdb.org/86038" }, { "name": "adobe-cve20125261-code-exec(79082)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79082" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5261", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.428Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5256
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79077 | vdb-entry, x_refsource_XF | |
http://osvdb.org/86033 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125256-code-exec(79077)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79077" }, { "name": "86033", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86033" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125256-code-exec(79077)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79077" }, { "name": "86033", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86033" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5256", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125256-code-exec(79077)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79077" }, { "name": "86033", "refsource": "OSVDB", "url": "http://osvdb.org/86033" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5256", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5255
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86032 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79076 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.398Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86032", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86032" }, { "name": "adobe-cve20125255-bo(79076)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79076" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86032", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86032" }, { "name": "adobe-cve20125255-bo(79076)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79076" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5255", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86032", "refsource": "OSVDB", "url": "http://osvdb.org/86032" }, { "name": "adobe-cve20125255-bo(79076)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79076" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5255", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5287
Vulnerability from cvelistv5
Published
2012-11-13 11:00
Modified
2024-08-06 21:05
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/56376 | vdb-entry, x_refsource_BID | |
http://osvdb.org/86876 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79772 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:05:45.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "56376", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56376" }, { "name": "86876", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125287-bo(79772)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79772" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-11-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "56376", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56376" }, { "name": "86876", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125287-bo(79772)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79772" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5287", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "56376", "refsource": "BID", "url": "http://www.securityfocus.com/bid/56376" }, { "name": "86876", "refsource": "OSVDB", "url": "http://osvdb.org/86876" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125287-bo(79772)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79772" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5287", "datePublished": "2012-11-13T11:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T21:05:45.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5263
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86040 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79084 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86040", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86040" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125263-code-exec(79084)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86040", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86040" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125263-code-exec(79084)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79084" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5263", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86040", "refsource": "OSVDB", "url": "http://osvdb.org/86040" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125263-code-exec(79084)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79084" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5263", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0768
Vulnerability from cvelistv5
Published
2012-03-05 21:00
Modified
2024-08-06 18:38
Severity ?
EPSS score ?
Summary
The Matrix3D component in Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15922 | vdb-entry, signature, x_refsource_OVAL | |
http://www.adobe.com/support/security/bulletins/apsb12-05.html | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15058 | vdb-entry, signature, x_refsource_OVAL | |
http://security.gentoo.org/glsa/glsa-201204-07.xml | vendor-advisory, x_refsource_GENTOO | |
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html | vendor-advisory, x_refsource_SUSE | |
http://secunia.com/advisories/48819 | third-party-advisory, x_refsource_SECUNIA | |
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:15922", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15922" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-05.html" }, { "name": "oval:org.mitre.oval:def:15058", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15058" }, { "name": "GLSA-201204-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml" }, { "name": "SUSE-SU-2012:0332", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" }, { "name": "openSUSE-SU-2012:0331", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" }, { "name": "48819", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48819" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The Matrix3D component in Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "oval:org.mitre.oval:def:15922", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15922" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-05.html" }, { "name": "oval:org.mitre.oval:def:15058", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15058" }, { "name": "GLSA-201204-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml" }, { "name": "SUSE-SU-2012:0332", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" }, { "name": "openSUSE-SU-2012:0331", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" }, { "name": "48819", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48819" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0768", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Matrix3D component in Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:15922", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15922" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-05.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-05.html" }, { "name": "oval:org.mitre.oval:def:15058", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15058" }, { "name": "GLSA-201204-07", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml" }, { "name": "SUSE-SU-2012:0332", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" }, { "name": "openSUSE-SU-2012:0331", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" }, { "name": "48819", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48819" }, { "name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", "refsource": "CONFIRM", "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0768", "datePublished": "2012-03-05T21:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0769
Vulnerability from cvelistv5
Published
2012-03-05 21:00
Modified
2024-08-06 18:38
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x does not properly handle integers, which allows attackers to obtain sensitive information via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14828 | vdb-entry, signature, x_refsource_OVAL | |
http://www.adobe.com/support/security/bulletins/apsb12-05.html | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-201204-07.xml | vendor-advisory, x_refsource_GENTOO | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16212 | vdb-entry, signature, x_refsource_OVAL | |
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html | vendor-advisory, x_refsource_SUSE | |
http://secunia.com/advisories/48819 | third-party-advisory, x_refsource_SECUNIA | |
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:14828", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-05.html" }, { "name": "GLSA-201204-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml" }, { "name": "oval:org.mitre.oval:def:16212", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16212" }, { "name": "SUSE-SU-2012:0332", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" }, { "name": "openSUSE-SU-2012:0331", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" }, { "name": "48819", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48819" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x does not properly handle integers, which allows attackers to obtain sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "oval:org.mitre.oval:def:14828", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14828" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-05.html" }, { "name": "GLSA-201204-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml" }, { "name": "oval:org.mitre.oval:def:16212", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16212" }, { "name": "SUSE-SU-2012:0332", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" }, { "name": "openSUSE-SU-2012:0331", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" }, { "name": "48819", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48819" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-0769", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x does not properly handle integers, which allows attackers to obtain sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:14828", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14828" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-05.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-05.html" }, { "name": "GLSA-201204-07", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201204-07.xml" }, { "name": "oval:org.mitre.oval:def:16212", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16212" }, { "name": "SUSE-SU-2012:0332", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00006.html" }, { "name": "openSUSE-SU-2012:0331", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00005.html" }, { "name": "48819", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48819" }, { "name": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf", "refsource": "CONFIRM", "url": "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-0769", "datePublished": "2012-03-05T21:00:00", "dateReserved": "2012-01-18T00:00:00", "dateUpdated": "2024-08-06T18:38:14.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4171
Vulnerability from cvelistv5
Published
2012-08-31 19:00
Modified
2024-08-06 20:28
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.23 and 11.x before 11.4.402.265 on Windows and Mac OS X, before 10.3.183.23 and 11.x before 11.2.202.238 on Linux, before 11.1.111.16 on Android 2.x and 3.x, and before 11.1.115.17 on Android 4.x; Adobe AIR before 3.4.0.2540; and Adobe AIR SDK before 3.4.0.2540 allow attackers to cause a denial of service (application crash) by leveraging a logic error during handling of Firefox dialogs.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/55365 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb12-19.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78226 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "55365", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/55365" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html" }, { "name": "adobe-flash-air-logic-dos(78226)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78226" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.23 and 11.x before 11.4.402.265 on Windows and Mac OS X, before 10.3.183.23 and 11.x before 11.2.202.238 on Linux, before 11.1.111.16 on Android 2.x and 3.x, and before 11.1.115.17 on Android 4.x; Adobe AIR before 3.4.0.2540; and Adobe AIR SDK before 3.4.0.2540 allow attackers to cause a denial of service (application crash) by leveraging a logic error during handling of Firefox dialogs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "55365", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/55365" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html" }, { "name": "adobe-flash-air-logic-dos(78226)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78226" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-4171", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.23 and 11.x before 11.4.402.265 on Windows and Mac OS X, before 10.3.183.23 and 11.x before 11.2.202.238 on Linux, before 11.1.111.16 on Android 2.x and 3.x, and before 11.1.115.17 on Android 4.x; Adobe AIR before 3.4.0.2540; and Adobe AIR SDK before 3.4.0.2540 allow attackers to cause a denial of service (application crash) by leveraging a logic error during handling of Firefox dialogs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "55365", "refsource": "BID", "url": "http://www.securityfocus.com/bid/55365" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-19.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html" }, { "name": "adobe-flash-air-logic-dos(78226)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78226" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-4171", "datePublished": "2012-08-31T19:00:00", "dateReserved": "2012-08-07T00:00:00", "dateUpdated": "2024-08-06T20:28:07.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5251
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86028 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79072 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86028", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86028" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125251-bo(79072)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79072" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86028", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86028" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125251-bo(79072)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79072" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5251", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86028", "refsource": "OSVDB", "url": "http://osvdb.org/86028" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125251-bo(79072)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79072" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5251", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5270
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79091 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.379Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125270-code-exec(79091)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79091" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125270-code-exec(79091)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79091" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5270", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125270-code-exec(79091)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79091" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5270", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5286
Vulnerability from cvelistv5
Published
2012-11-13 11:00
Modified
2024-08-06 21:05
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/79771 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/56375 | vdb-entry, x_refsource_BID | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
http://osvdb.org/86875 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:05:45.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-cve20125286-bo(79771)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79771" }, { "name": "56375", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56375" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86875", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86875" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-11-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-cve20125286-bo(79771)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79771" }, { "name": "56375", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56375" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86875", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86875" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5286", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-cve20125286-bo(79771)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79771" }, { "name": "56375", "refsource": "BID", "url": "http://www.securityfocus.com/bid/56375" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86875", "refsource": "OSVDB", "url": "http://osvdb.org/86875" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5286", "datePublished": "2012-11-13T11:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T21:05:45.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5250
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79071 | vdb-entry, x_refsource_XF | |
http://osvdb.org/86027 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125250-bo(79071)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79071" }, { "name": "86027", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86027" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125250-bo(79071)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79071" }, { "name": "86027", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86027" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5250", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125250-bo(79071)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79071" }, { "name": "86027", "refsource": "OSVDB", "url": "http://osvdb.org/86027" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5250", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5269
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/86046 | vdb-entry, x_refsource_OSVDB | |
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79090 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "86046", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86046" }, { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125269-code-exec(79090)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79090" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "86046", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86046" }, { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125269-code-exec(79090)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79090" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5269", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "86046", "refsource": "OSVDB", "url": "http://osvdb.org/86046" }, { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125269-code-exec(79090)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79090" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5269", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5265
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/79086 | vdb-entry, x_refsource_XF | |
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86042 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.596Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-cve20125265-bo(79086)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79086" }, { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86042", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86042" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-cve20125265-bo(79086)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79086" }, { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86042", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86042" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5265", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-cve20125265-bo(79086)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79086" }, { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86042", "refsource": "OSVDB", "url": "http://osvdb.org/86042" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5265", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5258
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79079 | vdb-entry, x_refsource_XF | |
http://osvdb.org/86035 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125258-code-exec(79079)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79079" }, { "name": "86035", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86035" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125258-code-exec(79079)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79079" }, { "name": "86035", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86035" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5258", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125258-code-exec(79079)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79079" }, { "name": "86035", "refsource": "OSVDB", "url": "http://osvdb.org/86035" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5258", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5257
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86034 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79078 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86034", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86034" }, { "name": "adobe-cve20125257-bo(79078)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79078" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86034", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86034" }, { "name": "adobe-cve20125257-bo(79078)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79078" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5257", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86034", "refsource": "OSVDB", "url": "http://osvdb.org/86034" }, { "name": "adobe-cve20125257-bo(79078)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79078" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5257", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5268
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79089 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
http://osvdb.org/86045 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125268-code-exec(79089)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79089" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86045", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86045" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125268-code-exec(79089)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79089" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86045", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86045" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5268", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125268-code-exec(79089)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79089" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86045", "refsource": "OSVDB", "url": "http://osvdb.org/86045" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5268", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5267
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86044 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79088 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.427Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86044", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86044" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125267-code-exec(79088)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79088" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86044", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86044" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125267-code-exec(79088)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79088" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5267", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86044", "refsource": "OSVDB", "url": "http://osvdb.org/86044" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125267-code-exec(79088)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79088" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5267", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-0646
Vulnerability from cvelistv5
Published
2013-03-13 10:00
Modified
2024-08-06 14:33
Severity ?
EPSS score ?
Summary
Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb13-09.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html | vendor-advisory, x_refsource_SUSE | |
http://marc.info/?l=bugtraq&m=139455789818399&w=2 | vendor-advisory, x_refsource_HP | |
http://rhn.redhat.com/errata/RHSA-2013-0643.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:33:05.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-17T13:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-0646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0464", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-09.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-0646", "datePublished": "2013-03-13T10:00:00", "dateReserved": "2012-12-18T00:00:00", "dateUpdated": "2024-08-06T14:33:05.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5262
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79083 | vdb-entry, x_refsource_XF | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
http://osvdb.org/86039 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.374Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125262-bo(79083)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79083" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86039", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86039" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125262-bo(79083)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79083" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86039", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86039" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5262", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "adobe-cve20125262-bo(79083)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79083" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86039", "refsource": "OSVDB", "url": "http://osvdb.org/86039" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5262", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.374Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1371
Vulnerability from cvelistv5
Published
2013-03-13 10:00
Modified
2024-08-06 14:57
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb13-09.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html | vendor-advisory, x_refsource_SUSE | |
http://marc.info/?l=bugtraq&m=139455789818399&w=2 | vendor-advisory, x_refsource_HP | |
http://rhn.redhat.com/errata/RHSA-2013-0643.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-17T13:57:00", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0464", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2013-1371", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK \u0026 Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0464", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00021.html" }, { "name": "openSUSE-SU-2013:0459", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00019.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb13-09.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb13-09.html" }, { "name": "SUSE-SU-2013:0458", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00018.html" }, { "name": "HPSBMU02948", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=139455789818399\u0026w=2" }, { "name": "RHSA-2013:0643", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0643.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2013-1371", "datePublished": "2013-03-13T10:00:00", "dateReserved": "2013-01-16T00:00:00", "dateUpdated": "2024-08-06T14:57:05.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5266
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86043 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79087 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86043", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86043" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125266-bo(79087)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79087" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86043", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86043" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125266-bo(79087)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79087" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5266", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86043", "refsource": "OSVDB", "url": "http://osvdb.org/86043" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "adobe-cve20125266-bo(79087)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79087" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5266", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5264
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
http://osvdb.org/86041 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79085 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.582Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86041", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86041" }, { "name": "adobe-cve20125264-bo(79085)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79085" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86041", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86041" }, { "name": "adobe-cve20125264-bo(79085)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79085" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5264", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86041", "refsource": "OSVDB", "url": "http://osvdb.org/86041" }, { "name": "adobe-cve20125264-bo(79085)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79085" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5264", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.582Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5249
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
http://osvdb.org/86026 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79070 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86026", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86026" }, { "name": "adobe-cve20125249-bo(79070)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79070" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86026", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86026" }, { "name": "adobe-cve20125249-bo(79070)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79070" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5249", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86026", "refsource": "OSVDB", "url": "http://osvdb.org/86026" }, { "name": "adobe-cve20125249-bo(79070)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79070" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5249", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5254
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/79075 | vdb-entry, x_refsource_XF | |
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://osvdb.org/86031 | vdb-entry, x_refsource_OSVDB | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-cve20125254-bo(79075)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79075" }, { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86031", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86031" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-cve20125254-bo(79075)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79075" }, { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86031", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86031" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5254", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-cve20125254-bo(79075)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79075" }, { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "86031", "refsource": "OSVDB", "url": "http://osvdb.org/86031" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5254", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5259
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
http://osvdb.org/86036 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79080 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86036", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86036" }, { "name": "adobe-cve20125259-bo(79080)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79080" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86036", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86036" }, { "name": "adobe-cve20125259-bo(79080)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79080" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5259", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86036", "refsource": "OSVDB", "url": "http://osvdb.org/86036" }, { "name": "adobe-cve20125259-bo(79080)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79080" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5259", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5253
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
EPSS score ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/79074 | vdb-entry, x_refsource_XF | |
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html | vendor-advisory, x_refsource_SUSE | |
http://www.adobe.com/support/security/bulletins/apsb12-22.html | x_refsource_CONFIRM | |
http://osvdb.org/86030 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:58:03.430Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "adobe-cve20125253-bo(79074)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79074" }, { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86030", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/86030" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "adobe-cve20125253-bo(79074)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79074" }, { "name": "openSUSE-SU-2013:0370", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86030", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/86030" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2012-5253", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "adobe-cve20125253-bo(79074)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79074" }, { "name": "openSUSE-SU-2013:0370", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html" }, { "name": "86030", "refsource": "OSVDB", "url": "http://osvdb.org/86030" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2012-5253", "datePublished": "2012-10-09T10:00:00", "dateReserved": "2012-10-04T00:00:00", "dateUpdated": "2024-08-06T20:58:03.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }