9.3
CVSSv2

CVE-2015-0336

Published: 13/03/2015 Updated: 01/07/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Adobe Flash Player prior to 13.0.0.277 and 14.x up to and including 17.x prior to 17.0.0.134 on Windows and OS X and prior to 11.2.202.451 on Linux allows malicious users to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0334.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash_player 15.0.0.239

adobe flash_player 15.0.0.246

adobe flash_player 16.0.0.235

adobe flash_player 15.0.0.167

adobe flash_player 14.0.0.145

adobe flash_player 14.0.0.176

adobe flash_player 16.0.0.287

adobe flash_player 16.0.0.257

adobe flash_player

adobe flash_player 14.0.0.125

adobe flash_player 16.0.0.305

adobe flash_player 16.0.0.296

adobe flash_player 15.0.0.189

adobe flash_player 15.0.0.223

adobe flash_player 14.0.0.179

adobe flash_player 15.0.0.152

Vendor Advisories

Adobe Flash Player before 1300277 and 14x through 17x before 1700134 on Windows and OS X and before 112202451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0334 ...

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Powershell include Msf::Exploit::Remote::BrowserExploitServer def initialize(info={}) super ...
This Metasploit module exploits a type confusion vulnerability in the NetConnection class on Adobe Flash Player When using a correct memory layout this vulnerability allows to corrupt arbitrary memory It can be used to overwrite dangerous objects, like vectors, and finally accomplish remote code execution This Metasploit module has been tested s ...

Github Repositories

Patching Flash binary to stop Flash exploits and zero-days

#HardenFlash - Patching Flash binary to stop Flash exploits and zero-days Introduction You probably know how bad it is for Flash security Five years ago we often heard of Flash-based zero-day attacks, 5 years later we are still facing the same situation (or even worse since we are in the "APT" era now) In Feb 2013, the author revealed the aka "Vector Spray&q

Recent Articles

World's worst exploit kit now targeting point-of-sale systems
The Register • Darren Pauli • 31 Jul 2015

Eyes PoS vendors, web terminals.

Trend Micro researcher Anthony Joe Melgarejo says the sophisticated Angler exploit kit popular in cybercrime circles is now targeting point-of-sale (PoS) systems. It appears to be the first time an exploit kit has included PoS in its list of hackable platforms, putting them alongside the likes of Adobe Flash, Reader, Java, and Internet Explorer as targets crims think are low-hanging fruit. Melgarejo says Angler often establishes a network beachhead with a malvertising campaign targeting web PoS ...