CVE-2014-0558
Vulnerability from cvelistv5
Published
2014-10-15 10:00
Modified
2024-08-06 09:20
Severity ?
EPSS score ?
Summary
Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK & Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0564.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:20:19.780Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2014:1329", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html" }, { "name": "61980", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61980" }, { "name": "SUSE-SU-2014:1360", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html" }, { "name": "RHSA-2014:1648", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1648.html" }, { "name": "1031019", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031019" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-22.html" }, { "name": "openSUSE-SU-2015:0725", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK \u0026 Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0564." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "openSUSE-SU-2014:1329", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html" }, { "name": "61980", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61980" }, { "name": "SUSE-SU-2014:1360", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html" }, { "name": "RHSA-2014:1648", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1648.html" }, { "name": "1031019", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031019" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-22.html" }, { "name": "openSUSE-SU-2015:0725", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2014-0558", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK \u0026 Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0564." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2014:1329", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html" }, { "name": "61980", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61980" }, { "name": "SUSE-SU-2014:1360", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html" }, { "name": "RHSA-2014:1648", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1648.html" }, { "name": "1031019", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031019" }, { "name": "http://helpx.adobe.com/security/products/flash-player/apsb14-22.html", "refsource": "CONFIRM", "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-22.html" }, { "name": "openSUSE-SU-2015:0725", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2014-0558", "datePublished": "2014-10-15T10:00:00", "dateReserved": "2013-12-20T00:00:00", "dateUpdated": "2024-08-06T09:20:19.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"13.0.0.244\", \"matchCriteriaId\": \"D4D508C5-938D-4687-B826-CA442DCC1D32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:13.0.0.182:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3DD6547-ABEE-4734-87AA-BD3E247226B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:13.0.0.201:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0732FFB7-4BFD-499D-A166-9128F3DABA0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:13.0.0.206:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C282F91D-C1FE-4CC7-A33D-8E43F85DF168\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:13.0.0.214:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11E8C1F3-83AA-468B-8F5A-285F3BD19CC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:13.0.0.223:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59F08016-055D-4B70-8085-9C657481BA9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:13.0.0.231:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AA91689-F95C-4C67-A1AE-4CCA6FB29923\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:13.0.0.241:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64384C6E-0890-436D-83B8-8E2661C52E00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5D7202D-56DF-400B-9F09-E7D9938222D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D4F0D21-A64B-46C1-9591-96529661DF0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86961019-3B81-458E-949F-A2F006EA55FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25895BE9-71FD-4DE7-90FC-0199470A8738\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57882CDA-B99B-40EC-921A-8DFF5D820C97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D55A950-7D48-413C-AD43-6AC64FBE790C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"15.0.0.252\", \"matchCriteriaId\": \"9A2DA3A8-3A62-4EF0-BA60-E8AF1812901C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C898203-9D6E-4430-8905-C28180F954E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:13.0.0.111:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"434B6846-3ED5-4F23-88D1-567668EE8E94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:14.0.0.110:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB252359-318A-4054-8CEA-D08AB7500100\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:14.0.0.137:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FE7DA31-9C37-4561-A7E5-76EF2DE65EA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:14.0.0.179:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0105611C-B013-49BF-8E96-CC105739FD85\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"15.0.0.249\", \"matchCriteriaId\": \"AE453157-6A44-4D44-A5E4-A38C7C4A4666\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C898203-9D6E-4430-8905-C28180F954E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:13.0.0.111:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"434B6846-3ED5-4F23-88D1-567668EE8E94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:14.0.0.110:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB252359-318A-4054-8CEA-D08AB7500100\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:14.0.0.137:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FE7DA31-9C37-4561-A7E5-76EF2DE65EA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air:14.0.0.178:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9021A6AA-BEE6-4910-A3D5-E4EE25FC12AF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"11.2.202.406\", \"matchCriteriaId\": \"7A2FFBD2-7CB6-4E4F-B065-F56F73DF30F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"146E1EAC-B9AF-4511-A0DC-A048428E3B68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39065E60-3680-4384-95C0-EF4F874D2400\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B0603B3-5C98-422D-A49D-EBE1798DAE69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AC7882D-1577-4CEA-B1C0-0FEBC91A441A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CED86796-B721-49B1-A021-82FA769FA024\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF7843C6-628A-4091-8A09-6E126A89870E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"472F569C-0FD5-4F61-A4D6-258A8A9C4008\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47F94E94-C190-4559-8FF6-FEEE6634B67B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE46E137-5298-44FA-B40C-6079C9AEE60F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D14EAFB3-3718-466F-8EB2-61D00D569251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.275:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD3390A0-8EB6-424E-96AC-B87E22D6FF6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.280:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCD935A5-D923-48CC-9699-977C5123D52C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.285:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AABFF8D-2C2A-4B8B-9DE2-C74EECEDD86F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.291:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD0EF3E4-C91F-4AD4-91E7-A10DC66DE4A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.297:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DDB9C24-953C-4268-8C4A-E7C0F021698E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.310:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8474A98-24F4-43E5-9402-319F68A9880B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.332:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CD7F4E8-742E-4264-84EE-22D9E3CB3C76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.335:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97DBA814-D400-440C-BEEA-AB1913F783C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.336:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CDA6379-D70E-476C-82C5-C916C13CA081\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.341:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"515589AD-8CC1-46CE-9F9A-BAAD725E2C8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.346:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"308488AB-3D95-4231-8201-BF4EE5C9C151\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.350:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDB40406-277E-4BF5-ADCF-BE16B1CF390B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.356:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33165339-9DCC-46B2-B22F-CF31D26175D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.359:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28AB62F3-9CB0-4ED8-9785-2B4878BB101D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.378:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF423A60-6377-4782-B809-D6304322F391\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.394:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47215F3E-46D4-447B-BA57-3851D25659CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:11.2.202.400:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CFB2173-8E51-4C35-AD40-A017AEB4AEF5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"155AD4FB-E527-4103-BCEF-801B653DEA37\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"15.0.0.249\", \"matchCriteriaId\": \"421607E2-87BD-4525-9E05-F4C2034BBEFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.83:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B005E5AC-DD7D-413E-92A2-4E8D7F3F2D7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.111:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F228403E-68B3-4B18-B120-066346D80891\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air_sdk:14.0.0.110:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73E1378C-8C12-4728-BC84-2836691C2B11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air_sdk:14.0.0.137:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D089EFE1-4EAA-4644-9C01-35D70C508827\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:adobe_air_sdk:14.0.0.178:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90DC6087-48D4-4419-8ABB-EA30A1A674E9\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK \u0026 Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0564.\"}, {\"lang\": \"es\", \"value\": \"Adobe Flash Player anterior a 13.0.0.250 y 14.x y 15.x anterior a 15.0.0.189 en Windows y OS X y anterior a 11.2.202.411 en Linux, Adobe AIR anterior a 15.0.0.293, Adobe AIR SDK anterior a 15.0.0.302, y Adobe AIR SDK \u0026 Compiler anterior a 15.0.0.302 permiten a atacantes ejecutar c\\u00f3digo arbitrario o causar una denegaci\\u00f3n de servicio (corrupci\\u00f3n de memoria) a trav\\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0564.\"}]", "id": "CVE-2014-0558", "lastModified": "2024-11-21T02:02:23.373", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2014-10-15T10:55:06.083", "references": "[{\"url\": \"http://helpx.adobe.com/security/products/flash-player/apsb14-22.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1648.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://secunia.com/advisories/61980\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://www.securitytracker.com/id/1031019\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://helpx.adobe.com/security/products/flash-player/apsb14-22.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1648.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61980\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1031019\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2014-0558\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2014-10-15T10:55:06.083\",\"lastModified\":\"2024-11-21T02:02:23.373\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and OS X and before 11.2.202.411 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK \u0026 Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0564.\"},{\"lang\":\"es\",\"value\":\"Adobe Flash Player anterior a 13.0.0.250 y 14.x y 15.x anterior a 15.0.0.189 en Windows y OS X y anterior a 11.2.202.411 en Linux, Adobe AIR anterior a 15.0.0.293, Adobe AIR SDK anterior a 15.0.0.302, y Adobe AIR SDK \u0026 Compiler anterior a 15.0.0.302 permiten a atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0564.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"13.0.0.244\",\"matchCriteriaId\":\"D4D508C5-938D-4687-B826-CA442DCC1D32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:13.0.0.182:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DD6547-ABEE-4734-87AA-BD3E247226B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:13.0.0.201:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0732FFB7-4BFD-499D-A166-9128F3DABA0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:13.0.0.206:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C282F91D-C1FE-4CC7-A33D-8E43F85DF168\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:13.0.0.214:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E8C1F3-83AA-468B-8F5A-285F3BD19CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:13.0.0.223:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F08016-055D-4B70-8085-9C657481BA9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:13.0.0.231:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AA91689-F95C-4C67-A1AE-4CCA6FB29923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:13.0.0.241:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64384C6E-0890-436D-83B8-8E2661C52E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D7202D-56DF-400B-9F09-E7D9938222D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D4F0D21-A64B-46C1-9591-96529661DF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86961019-3B81-458E-949F-A2F006EA55FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25895BE9-71FD-4DE7-90FC-0199470A8738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:15.0.0.144:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57882CDA-B99B-40EC-921A-8DFF5D820C97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D55A950-7D48-413C-AD43-6AC64FBE790C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"15.0.0.252\",\"matchCriteriaId\":\"9A2DA3A8-3A62-4EF0-BA60-E8AF1812901C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C898203-9D6E-4430-8905-C28180F954E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:13.0.0.111:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"434B6846-3ED5-4F23-88D1-567668EE8E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:14.0.0.110:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB252359-318A-4054-8CEA-D08AB7500100\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:14.0.0.137:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FE7DA31-9C37-4561-A7E5-76EF2DE65EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:14.0.0.179:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0105611C-B013-49BF-8E96-CC105739FD85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"15.0.0.249\",\"matchCriteriaId\":\"AE453157-6A44-4D44-A5E4-A38C7C4A4666\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C898203-9D6E-4430-8905-C28180F954E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:13.0.0.111:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"434B6846-3ED5-4F23-88D1-567668EE8E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:14.0.0.110:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB252359-318A-4054-8CEA-D08AB7500100\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:14.0.0.137:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FE7DA31-9C37-4561-A7E5-76EF2DE65EA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:14.0.0.178:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9021A6AA-BEE6-4910-A3D5-E4EE25FC12AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.2.202.406\",\"matchCriteriaId\":\"7A2FFBD2-7CB6-4E4F-B065-F56F73DF30F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"146E1EAC-B9AF-4511-A0DC-A048428E3B68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39065E60-3680-4384-95C0-EF4F874D2400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B0603B3-5C98-422D-A49D-EBE1798DAE69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC7882D-1577-4CEA-B1C0-0FEBC91A441A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CED86796-B721-49B1-A021-82FA769FA024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF7843C6-628A-4091-8A09-6E126A89870E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"472F569C-0FD5-4F61-A4D6-258A8A9C4008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47F94E94-C190-4559-8FF6-FEEE6634B67B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE46E137-5298-44FA-B40C-6079C9AEE60F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14EAFB3-3718-466F-8EB2-61D00D569251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.275:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD3390A0-8EB6-424E-96AC-B87E22D6FF6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.280:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCD935A5-D923-48CC-9699-977C5123D52C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.285:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AABFF8D-2C2A-4B8B-9DE2-C74EECEDD86F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.291:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD0EF3E4-C91F-4AD4-91E7-A10DC66DE4A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.297:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DDB9C24-953C-4268-8C4A-E7C0F021698E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.310:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8474A98-24F4-43E5-9402-319F68A9880B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.332:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD7F4E8-742E-4264-84EE-22D9E3CB3C76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.335:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97DBA814-D400-440C-BEEA-AB1913F783C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.336:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CDA6379-D70E-476C-82C5-C916C13CA081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.341:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"515589AD-8CC1-46CE-9F9A-BAAD725E2C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.346:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"308488AB-3D95-4231-8201-BF4EE5C9C151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.350:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB40406-277E-4BF5-ADCF-BE16B1CF390B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.356:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33165339-9DCC-46B2-B22F-CF31D26175D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.359:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28AB62F3-9CB0-4ED8-9785-2B4878BB101D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.378:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF423A60-6377-4782-B809-D6304322F391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.394:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47215F3E-46D4-447B-BA57-3851D25659CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CFB2173-8E51-4C35-AD40-A017AEB4AEF5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155AD4FB-E527-4103-BCEF-801B653DEA37\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"15.0.0.249\",\"matchCriteriaId\":\"421607E2-87BD-4525-9E05-F4C2034BBEFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B005E5AC-DD7D-413E-92A2-4E8D7F3F2D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.111:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F228403E-68B3-4B18-B120-066346D80891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air_sdk:14.0.0.110:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E1378C-8C12-4728-BC84-2836691C2B11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air_sdk:14.0.0.137:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D089EFE1-4EAA-4644-9C01-35D70C508827\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air_sdk:14.0.0.178:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90DC6087-48D4-4419-8ABB-EA30A1A674E9\"}]}]}],\"references\":[{\"url\":\"http://helpx.adobe.com/security/products/flash-player/apsb14-22.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1648.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://secunia.com/advisories/61980\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securitytracker.com/id/1031019\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://helpx.adobe.com/security/products/flash-player/apsb14-22.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1648.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1031019\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.