CVE-2015-5116 (GCVE-0-2015-5116)

Vulnerability from cvelistv5 – Published: 2015-07-09 16:00 – Updated: 2024-08-06 06:32
VLAI?
Summary
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, and CVE-2015-3125.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id/1032810 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/75594 vdb-entryx_refsource_BID
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2015-1214.html vendor-advisoryx_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://security.gentoo.org/glsa/201507-13 vendor-advisoryx_refsource_GENTOO
https://helpx.adobe.com/security/products/flash-p… x_refsource_CONFIRM
https://www.exploit-db.com/exploits/37851/ exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:32:32.819Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1032810",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1032810"
          },
          {
            "name": "75594",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75594"
          },
          {
            "name": "SUSE-SU-2015:1211",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html"
          },
          {
            "name": "RHSA-2015:1214",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1214.html"
          },
          {
            "name": "SUSE-SU-2015:1214",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html"
          },
          {
            "name": "GLSA-201507-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201507-13"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html"
          },
          {
            "name": "37851",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/37851/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK \u0026 Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, and CVE-2015-3125."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-21T09:57:01",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "name": "1032810",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1032810"
        },
        {
          "name": "75594",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75594"
        },
        {
          "name": "SUSE-SU-2015:1211",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html"
        },
        {
          "name": "RHSA-2015:1214",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1214.html"
        },
        {
          "name": "SUSE-SU-2015:1214",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html"
        },
        {
          "name": "GLSA-201507-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201507-13"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html"
        },
        {
          "name": "37851",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/37851/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@adobe.com",
          "ID": "CVE-2015-5116",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK \u0026 Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, and CVE-2015-3125."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1032810",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1032810"
            },
            {
              "name": "75594",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/75594"
            },
            {
              "name": "SUSE-SU-2015:1211",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html"
            },
            {
              "name": "RHSA-2015:1214",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2015-1214.html"
            },
            {
              "name": "SUSE-SU-2015:1214",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html"
            },
            {
              "name": "GLSA-201507-13",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201507-13"
            },
            {
              "name": "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html",
              "refsource": "CONFIRM",
              "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-16.html"
            },
            {
              "name": "37851",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/37851/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2015-5116",
    "datePublished": "2015-07-09T16:00:00",
    "dateReserved": "2015-06-26T00:00:00",
    "dateUpdated": "2024-08-06T06:32:32.819Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"13.0.0.289\", \"matchCriteriaId\": \"E2E515D4-87A7-4CB5-8C91-0A95BE8F283B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5D7202D-56DF-400B-9F09-E7D9938222D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D4F0D21-A64B-46C1-9591-96529661DF0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86961019-3B81-458E-949F-A2F006EA55FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25895BE9-71FD-4DE7-90FC-0199470A8738\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D55A950-7D48-413C-AD43-6AC64FBE790C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1A22B74-453D-4A8A-B79A-2B3143A0D995\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FE4B077-67D1-4B25-976E-715FB6B2A1D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC91B68-6B35-47BD-BC02-3F836E772CF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3BE6004-C30A-46E2-9F25-785E12BBF640\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFE8E51F-7A32-41A4-B03A-73E52EB64C04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E13E927-A77C-4681-AFDE-A5A14093234D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27629FF0-5EB9-476F-B5B3-115F663AB65E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0AB583F-3EBD-47B6-975E-7754CC32CCA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B58DE1A9-0510-4B65-AB18-75F9263A7818\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BC4FAD0-4A54-4EDF-BE39-28138B34E719\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE1FBC20-3DE6-4426-9E97-42AFCEF8CEE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40EF2221-DE87-4D8F-B92D-8FD21EEBEABA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:17.0.0.190:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DF6FE30-4B7A-49EB-8571-C2C6E6F8F10C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:18.0.0.160:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8349AC-871D-4320-B361-D5877CD4DDC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:18.0.0.194:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"950A7A0E-8241-430A-BA17-49C650079DCE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"11.2.202.468\", \"matchCriteriaId\": \"3C547233-4305-4F4A-9832-2F4DF0371B41\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"18.0.0.144\", \"matchCriteriaId\": \"158668A4-C31B-4730-85C1-CA52863ABE8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"18.0.0.144\", \"matchCriteriaId\": \"A58E9BD6-1D98-4D3B-ABC2-A03DDB7B956A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:air_sdk_\\\\\u0026_compiler:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"18.0.0.144\", \"matchCriteriaId\": \"9589C539-7397-4BE0-A1C2-B1CAD88D50EB\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK \u0026 Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, and CVE-2015-3125.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad descubierta en las versiones de Adobe Flash Player anteriores a la 13.0.0.302 y la 14.x hasta la 18.x anterior a 18.0.0.203 para Windows y OS X y la anterior a la 11.2.202.481 en Linux, en Adobe AIR en la versi\\u00f3n anterior a la 18.0.0.180, en Adobe AIR SDK en la versi\\u00f3n anterior a la 18.0.0.180 y en Adobe AIR SDK y en el Compilador anterior a la versi\\u00f3n 18.0.0.180 permite que los atacantes remotos puedan eludir la pol\\u00edtica del mismo origen a trav\\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, y CVE-2015-3125.\"}]",
      "id": "CVE-2015-5116",
      "lastModified": "2024-11-21T02:32:23.553",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": true, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2015-07-09T16:59:28.917",
      "references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-1214.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://www.securityfocus.com/bid/75594\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://www.securitytracker.com/id/1032810\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"https://helpx.adobe.com/security/products/flash-player/apsb15-16.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201507-13\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"https://www.exploit-db.com/exploits/37851/\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-1214.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/75594\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1032810\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://helpx.adobe.com/security/products/flash-player/apsb15-16.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201507-13\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.exploit-db.com/exploits/37851/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "psirt@adobe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-284\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2015-5116\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2015-07-09T16:59:28.917\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK \u0026 Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, and CVE-2015-3125.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad descubierta en las versiones de Adobe Flash Player anteriores a la 13.0.0.302 y la 14.x hasta la 18.x anterior a 18.0.0.203 para Windows y OS X y la anterior a la 11.2.202.481 en Linux, en Adobe AIR en la versi\u00f3n anterior a la 18.0.0.180, en Adobe AIR SDK en la versi\u00f3n anterior a la 18.0.0.180 y en Adobe AIR SDK y en el Compilador anterior a la versi\u00f3n 18.0.0.180 permite que los atacantes remotos puedan eludir la pol\u00edtica del mismo origen a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, y CVE-2015-3125.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"13.0.0.289\",\"matchCriteriaId\":\"E2E515D4-87A7-4CB5-8C91-0A95BE8F283B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D7202D-56DF-400B-9F09-E7D9938222D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D4F0D21-A64B-46C1-9591-96529661DF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86961019-3B81-458E-949F-A2F006EA55FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25895BE9-71FD-4DE7-90FC-0199470A8738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D55A950-7D48-413C-AD43-6AC64FBE790C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A22B74-453D-4A8A-B79A-2B3143A0D995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FE4B077-67D1-4B25-976E-715FB6B2A1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC91B68-6B35-47BD-BC02-3F836E772CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3BE6004-C30A-46E2-9F25-785E12BBF640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE8E51F-7A32-41A4-B03A-73E52EB64C04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E13E927-A77C-4681-AFDE-A5A14093234D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27629FF0-5EB9-476F-B5B3-115F663AB65E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0AB583F-3EBD-47B6-975E-7754CC32CCA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58DE1A9-0510-4B65-AB18-75F9263A7818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BC4FAD0-4A54-4EDF-BE39-28138B34E719\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE1FBC20-3DE6-4426-9E97-42AFCEF8CEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40EF2221-DE87-4D8F-B92D-8FD21EEBEABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:17.0.0.190:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DF6FE30-4B7A-49EB-8571-C2C6E6F8F10C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:18.0.0.160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8349AC-871D-4320-B361-D5877CD4DDC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:18.0.0.194:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"950A7A0E-8241-430A-BA17-49C650079DCE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.2.202.468\",\"matchCriteriaId\":\"3C547233-4305-4F4A-9832-2F4DF0371B41\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"18.0.0.144\",\"matchCriteriaId\":\"158668A4-C31B-4730-85C1-CA52863ABE8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"18.0.0.144\",\"matchCriteriaId\":\"A58E9BD6-1D98-4D3B-ABC2-A03DDB7B956A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:air_sdk_\\\\\u0026_compiler:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"18.0.0.144\",\"matchCriteriaId\":\"9589C539-7397-4BE0-A1C2-B1CAD88D50EB\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1214.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securityfocus.com/bid/75594\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securitytracker.com/id/1032810\",\"source\":\"psirt@adobe.com\"},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb15-16.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201507-13\",\"source\":\"psirt@adobe.com\"},{\"url\":\"https://www.exploit-db.com/exploits/37851/\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1214.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/75594\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1032810\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb15-16.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201507-13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/37851/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…