cve-2012-5251
Vulnerability from cvelistv5
Published
2012-10-09 10:00
Modified
2024-08-06 20:58
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:58:03.490Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2013:0370",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html"
          },
          {
            "name": "86028",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/86028"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html"
          },
          {
            "name": "adobe-cve20125251-bo(79072)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79072"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-10-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "name": "openSUSE-SU-2013:0370",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html"
        },
        {
          "name": "86028",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/86028"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html"
        },
        {
          "name": "adobe-cve20125251-bo(79072)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79072"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@adobe.com",
          "ID": "CVE-2012-5251",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2013:0370",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html"
            },
            {
              "name": "86028",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/86028"
            },
            {
              "name": "http://www.adobe.com/support/security/bulletins/apsb12-22.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/bulletins/apsb12-22.html"
            },
            {
              "name": "adobe-cve20125251-bo(79072)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79072"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2012-5251",
    "datePublished": "2012-10-09T10:00:00",
    "dateReserved": "2012-10-04T00:00:00",
    "dateUpdated": "2024-08-06T20:58:03.490Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-5251\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2012-10-09T11:13:10.563\",\"lastModified\":\"2017-08-29T01:32:33.807\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en Adobe Flash Player antes de v10.3.183.29 y 11.x antes de v11.4.402.287 en Windows and Mac OS X, antes de v10.3.183.29 and 11.x antes de v11.2.202.243 en Linux, antes de v11.1.111.19 en Android 2.x y 3.x, and antes de v11.1.115.20 en Android 4.x; Adobe AIR antes de v3.4.0.2710; y Adobe AIR SDK antes de v3.4.0.2710, permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a otros CVE de desbordamiento de b\u00fafer en Flash Player listada como APSB12-22.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":10.0},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.3.183.25\",\"matchCriteriaId\":\"DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5484DE8-3CB1-4591-BF30-0D5E255034E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3ACD1B2-F952-46C8-989A-C4744E16D5E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D971B98A-2E97-4437-A7F1-3795E360565F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"110ED819-CFFD-4DA6-BE13-08CDEFD17ADF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A088CEA6-9871-4A4D-9139-EF241D0B9D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C2722F-55D0-4390-BCE0-5FCB61549278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4011899D-C2A3-463F-9C1A-A3478CA467B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330104CE-F418-4F6F-833E-725AF862BEB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A148CC5B-60B5-4098-AE1C-75349E50D301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"457D9876-959D-40A6-9B7A-6FA2C526F224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C73959-8BDF-45F1-B453-DEF20C75DC8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7081373-1693-4412-8B35-B594DE7EED64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46ADCE2B-03B1-45A8-A6F0-88369C314473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9143B30C-28AD-4844-92C9-65445B4A2050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CD017D9-3C1D-4E50-A0A4-DDC205ED0859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C80FBFB-7562-4574-A0A9-33E0F5B46065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8578EF3-9AAA-4E03-A74A-6973265427B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B67A163-6F07-43F3-8C2F-BEE69B0EBF12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DF4105C-162A-4523-8DE3-1CCF57F25F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D05546BB-7EE7-4202-8A55-D413C1BE6D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855B89AA-87DA-415F-8D63-E2DBC9C28FC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E04E602-4ABA-49C8-89BB-682F62A99A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"146E1EAC-B9AF-4511-A0DC-A048428E3B68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39065E60-3680-4384-95C0-EF4F874D2400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B0603B3-5C98-422D-A49D-EBE1798DAE69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CED86796-B721-49B1-A021-82FA769FA024\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF7843C6-628A-4091-8A09-6E126A89870E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"639AA6CC-A131-412F-8AC8-010ED2A57CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"965C8355-F2FA-4C47-9C74-C8480A93D1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F9DA9B4-71C4-46A2-B2F7-2ABFCEE0DD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA0B71DB-39BB-42B5-9D2C-0D6FF7CD8184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B284F980-D84B-441A-A763-141935512562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82A959FA-0AD2-4BF3-8443-7C8EFB89F55B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17796147-244A-40BD-8594-24D8E61C78E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F2AAB3-3776-46B4-B149-8CFD884F21C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.3.183.25\",\"matchCriteriaId\":\"DF2A5D6D-D538-49AF-B2F3-B28A9989B6EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5484DE8-3CB1-4591-BF30-0D5E255034E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3ACD1B2-F952-46C8-989A-C4744E16D5E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D971B98A-2E97-4437-A7F1-3795E360565F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"110ED819-CFFD-4DA6-BE13-08CDEFD17ADF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A088CEA6-9871-4A4D-9139-EF241D0B9D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C2722F-55D0-4390-BCE0-5FCB61549278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4011899D-C2A3-463F-9C1A-A3478CA467B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330104CE-F418-4F6F-833E-725AF862BEB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A148CC5B-60B5-4098-AE1C-75349E50D301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"457D9876-959D-40A6-9B7A-6FA2C526F224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C73959-8BDF-45F1-B453-DEF20C75DC8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7081373-1693-4412-8B35-B594DE7EED64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46ADCE2B-03B1-45A8-A6F0-88369C314473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9143B30C-28AD-4844-92C9-65445B4A2050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CD017D9-3C1D-4E50-A0A4-DDC205ED0859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C80FBFB-7562-4574-A0A9-33E0F5B46065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8578EF3-9AAA-4E03-A74A-6973265427B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B67A163-6F07-43F3-8C2F-BEE69B0EBF12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DF4105C-162A-4523-8DE3-1CCF57F25F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D05546BB-7EE7-4202-8A55-D413C1BE6D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855B89AA-87DA-415F-8D63-E2DBC9C28FC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E04E602-4ABA-49C8-89BB-682F62A99A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"146E1EAC-B9AF-4511-A0DC-A048428E3B68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39065E60-3680-4384-95C0-EF4F874D2400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B0603B3-5C98-422D-A49D-EBE1798DAE69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CED86796-B721-49B1-A021-82FA769FA024\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155AD4FB-E527-4103-BCEF-801B653DEA37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.1.111.16\",\"matchCriteriaId\":\"367CC931-220D-457A-B8FF-2CB8C8AB8873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06EA028F-6825-47FE-A3A4-44BA04C4FA48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A00F228-08B0-436B-AD52-5858EE05AAAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"710D2421-9AE0-406F-B188-048E3B2F995C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8097D00F-452A-4103-A443-8D218768680E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47D6CD90-E088-4291-9241-3D2CCA7CE0E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"467151E5-6B25-4CC9-BA26-4403F74416F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8360D0F0-F284-4653-9428-D8B644E0F21E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B5C925-34CB-4413-8DA0-2DBA375D628B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19684437-4997-444F-A356-02EB82AE33F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4685EA90-1E01-4FFB-AE31-91FD5D69E2D8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A33DBF65-09A6-4149-BABE-2FFFBF10C31D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B69434-13B2-4A43-AEB0-55E0ED403E54\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1755B91-1B6B-4A9E-BB6B-22B399A6DD02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A92E88F-CCED-41D7-AFB7-CE1F9265E546\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D13D3A00-27A0-4635-9D50-05CA81950691\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB959DB-AFE7-4667-9662-949ADAB81CE3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18669EEC-ABB9-4CE4-8C0E-A88BE08EC368\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D64B87-F1F1-4E52-86AE-F28E2C43A9A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83AB2497-59DE-4253-A758-A3D03FAEB913\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E197EC0-82DF-49D5-BD1A-7EA22EC0B806\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"286EED24-E011-4009-BC2E-B63CA06072CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E6F4DF-F80F-4A9B-871E-155C0D3DD449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC08431-C70E-4964-B7C0-C9C45F70DCD2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A2A79C6-A7BD-46C2-8320-B9652135F3BC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6997F035-D2F5-4174-B979-5D42FF69D9AC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1FD2E59-59BF-4611-B65B-A2981127CAC0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86BFE05E-9749-43AA-8DB6-E2F13C2E1759\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DAAB25F-26E4-4493-B3DA-F87240633031\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96CD6B49-B9D4-493E-902D-B4EF48260BB0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.1.115.17\",\"matchCriteriaId\":\"ABF400D3-49DA-44DD-84B3-62D414189A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1BE2FC-AD3A-47D5-AE29-25AFD38B18A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A89AD347-0366-4414-9DE1-65CE9B6EE860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB00E81-9DD9-4652-A758-39CA040257D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BC133FD-F856-4039-8981-81D42B355CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FC1D9DF-A32F-4514-8425-516FB19631EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD2501F-C071-4C27-9BA5-440A13F2EAA4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A39C31E3-75C0-4E92-A6B5-7D67B22E3449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB318EA4-2908-4B91-8DBB-20008FDF528A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4E46A9-B652-47CE-92E8-01021E57724B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DD8E3F-6308-4680-B932-4CBD8E58A7FB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DA9F0F7-D592-481E-884C-B1A94E702825\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.0.2540\",\"matchCriteriaId\":\"8CFF4DE5-6120-4AD1-8097-AB46E94533F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F0F4B8-A8AE-4AF2-8991-36DF5478AC90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F180F403-7032-497F-955B-0CB1D5CA3A74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18225F85-A8A0-4C0F-AF7B-1B90D32F63DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEDE1EC5-34BB-4C38-BA69-BC3A605E6B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51905ABB-C598-415F-9B6C-26963129352A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B822E580-99C8-4E82-BBDA-9D6973545195\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"267E63D6-18CA-48CD-8C6E-B88F22C94315\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E50A13-564F-4CE7-8335-B99B83AA0B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DFD4AA-0921-4144-A782-1FA110A54214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479BCE0B-6721-4BC4-B5A3-480B69041CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E76E7759-50B7-4351-AC46-16B02778EDC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D551FDD-F7FC-4F9A-9A07-A5091E15774B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD82FA6-9DF9-4F66-9FA7-D5A75B848529\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9EBEBFD-9535-4107-B4AB-899DD33E7B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4837C443-B6C8-49AC-9E1D-B10FD69B2847\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A6BA4F-1963-4E66-AD6E-67529325675B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61C0AF0-6D78-4B38-B319-438C6523CF08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF18BD1A-4ECC-4B4F-8D3D-42AEEC4CBEA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B8188C-C862-4BE9-9D23-09DDF3CA2FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89B0FEA7-ECC8-493D-96E3-054C81CC189E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A2272A4-2245-4133-AA29-7BF160DA07AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFA32A3-0519-4DB8-BCC3-2DA180C97D4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA95AEAC-D6C5-4ACB-8712-868C7D784E1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5E6CD1-6FD3-419F-B454-5E9A9CDC4C86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B20057F4-CE36-431F-9E30-5A103919711C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6270B475-2B46-4194-9A49-3223F92A215C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"153D7B82-22F4-48A8-8AFD-8829203C1F14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EC01657-8106-41A5-B862-70E68C0B4C14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"018ADC69-4B32-4AA2-89C3-69003050EA4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BD92B4-7378-49FF-BF99-861A0F186573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFAA44A4-3773-4D14-9CC4-14FA12A8EE0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"029709CE-7DF8-45F5-9A81-E0F2A389CD62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"077126E8-3F60-48A9-B77A-58B254DFBA0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08F6D5B1-F470-49DF-A0B4-81BD7E8BCD1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E7CC1A5-737E-462E-8AB8-AF4BE53F41BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC65C38-18CE-4C3E-A3CE-B16A1FC08FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04E13B92-56AD-41B5-9BBB-E6C4088277DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4.0.2540\",\"matchCriteriaId\":\"6A511378-ACDB-4C31-9B84-2A25568EDC7E\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00034.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://osvdb.org/86028\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb12-22.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/79072\",\"source\":\"psirt@adobe.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.