CVE-2014-0515CVE-2014-0515

Affected configuration(s):

cpe:/a:adobe:flash_player:11.2.202.223
cpe:/a:adobe:flash_player:11.2.202.228
cpe:/a:adobe:flash_player:11.2.202.233
cpe:/a:adobe:flash_player:11.2.202.235
cpe:/a:adobe:flash_player:11.2.202.236
cpe:/a:adobe:flash_player:11.2.202.238
cpe:/a:adobe:flash_player:11.2.202.243
cpe:/a:adobe:flash_player:11.2.202.251
cpe:/a:adobe:flash_player:11.2.202.258
cpe:/a:adobe:flash_player:11.2.202.261
cpe:/a:adobe:flash_player:11.2.202.262
cpe:/a:adobe:flash_player:11.2.202.270
cpe:/a:adobe:flash_player:11.2.202.273
cpe:/a:adobe:flash_player:11.2.202.275
cpe:/a:adobe:flash_player:11.2.202.280
cpe:/a:adobe:flash_player:11.2.202.285
cpe:/a:adobe:flash_player:11.2.202.291
cpe:/a:adobe:flash_player:11.2.202.297
cpe:/a:adobe:flash_player:11.2.202.310
cpe:/a:adobe:flash_player:11.2.202.332
cpe:/a:adobe:flash_player:11.2.202.335
cpe:/a:adobe:flash_player:11.2.202.336
cpe:/a:adobe:flash_player:11.2.202.341
cpe:/a:adobe:flash_player:11.2.202.346
cpe:/a:adobe:flash_player:11.2.202.350
cpe:/a:adobe:flash_player:11.7.700.169
cpe:/a:adobe:flash_player:11.7.700.202
cpe:/a:adobe:flash_player:11.7.700.224
cpe:/a:adobe:flash_player:11.7.700.225
cpe:/a:adobe:flash_player:11.7.700.232
cpe:/a:adobe:flash_player:11.7.700.242
cpe:/a:adobe:flash_player:11.7.700.257
cpe:/a:adobe:flash_player:11.7.700.260
cpe:/a:adobe:flash_player:11.7.700.261
cpe:/a:adobe:flash_player:11.7.700.269
cpe:/a:adobe:flash_player:11.7.700.272
cpe:/a:adobe:flash_player:11.7.700.275
cpe:/a:adobe:flash_player:11.8.800.94
cpe:/a:adobe:flash_player:11.8.800.97
cpe:/a:adobe:flash_player:11.8.800.168
cpe:/a:adobe:flash_player:13.0.0.182
cpe:/a:adobe:flash_player:13.0.0.201

Date published: 2014-04-29T06:37:03.733-04:00

Date last modified: 2017-01-06T21:59:29.920-05:00

CVSS Score: 10.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://helpx.adobe.com/security/products/flash-player/apsb14-13.html

Summary: Buffer overflow in Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x before 13.0.0.206 on Windows and OS X, and before 11.2.202.356 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in April 2014.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.