Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2015-0313
Deferred
Known KEV
More InfoOfficial Page
Source-psirt@adobe.com
View Known Exploited Vulnerability (KEV) details
Published At-02 Feb, 2015 | 19:59
Updated At-12 Apr, 2025 | 10:46

Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2015, a different vulnerability than CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2022-04-132022-05-04Adobe Flash Player Use-After-Free VulnerabilityThe impacted product is end-of-life and should be disconnected if still in use.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Adobe Inc.
adobe
>>flash_player>>Versions before 11.2.202.442(exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>-
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>flash_player>>Versions before 13.0.0.269(exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>flash_player>>Versions from 14.0.0.125(inclusive) to 16.0.0.305(exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>mac_os_x>>-
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows>>-
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
openSUSE
opensuse
>>evergreen>>11.4
cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>13.1
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>13.2
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
SUSE
suse
>>linux_enterprise_desktop>>11
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
SUSE
suse
>>linux_enterprise_desktop>>12
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
SUSE
suse
>>linux_enterprise_workstation_extension>>12
cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>internet_explorer>>10
cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_8>>-
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_rt>>-
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_server_2012>>-
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>internet_explorer>>11
cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_10_1507>>-
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_8.1>>-
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_rt_8.1>>-
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_server_2012>>r2
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>edge>>-
cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_10_1507>>-
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Primarynvd@nist.gov
CWE-416Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.htmlpsirt@adobe.com
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.htmlpsirt@adobe.com
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.htmlpsirt@adobe.com
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.htmlpsirt@adobe.com
Mailing List
Third Party Advisory
http://packetstormsecurity.com/files/131189/Adobe-Flash-Player-ByteArray-With-Workers-Use-After-Free.htmlpsirt@adobe.com
Exploit
Third Party Advisory
VDB Entry
http://secunia.com/advisories/62528psirt@adobe.com
Broken Link
http://secunia.com/advisories/62777psirt@adobe.com
Broken Link
http://secunia.com/advisories/62895psirt@adobe.com
Broken Link
http://www.osvdb.org/117853psirt@adobe.com
Broken Link
http://www.securityfocus.com/bid/72429psirt@adobe.com
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1031686psirt@adobe.com
Broken Link
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/100641psirt@adobe.com
Third Party Advisory
VDB Entry
https://helpx.adobe.com/security/products/flash-player/apsa15-02.htmlpsirt@adobe.com
Vendor Advisory
https://helpx.adobe.com/security/products/flash-player/apsb15-04.htmlpsirt@adobe.com
Broken Link
https://technet.microsoft.com/library/security/2755801psirt@adobe.com
Patch
Vendor Advisory
https://www.exploit-db.com/exploits/36579/psirt@adobe.com
Exploit
Third Party Advisory
VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://packetstormsecurity.com/files/131189/Adobe-Flash-Player-ByteArray-With-Workers-Use-After-Free.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
http://secunia.com/advisories/62528af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/62777af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/62895af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.osvdb.org/117853af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/72429af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1031686af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/100641af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://helpx.adobe.com/security/products/flash-player/apsa15-02.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://helpx.adobe.com/security/products/flash-player/apsb15-04.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
https://technet.microsoft.com/library/security/2755801af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
https://www.exploit-db.com/exploits/36579/af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found