8.8
CVSSv3

CVE-2015-8636

Published: 28/12/2015 Updated: 10/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Adobe Flash Player prior to 18.0.0.324 and 19.x and 20.x prior to 20.0.0.267 on Windows and OS X and prior to 11.2.202.559 on Linux, Adobe AIR prior to 20.0.0.233, Adobe AIR SDK prior to 20.0.0.233, and Adobe AIR SDK & Compiler prior to 20.0.0.233 allow malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8460, and CVE-2015-8645.

Vulnerable Product Search on Vulmon Subscribe to Product

adobe air

adobe flash_player 20.0.0.235

adobe flash_player 20.0.0.228

adobe flash_player 19.0.0.245

adobe flash_player 19.0.0.185

adobe flash_player

adobe flash_player 19.0.0.226

adobe flash_player 19.0.0.207

adobe air_sdk_\\&_compiler

adobe air_sdk

Vendor Advisories

Synopsis Critical: flash-plugin security update Type/Severity Security Advisory: Critical Topic An updated Adobe Flash Player package that fixes multiple security issuesis now available for Red Hat Enterprise Linux 5 and 6 SupplementaryRed Hat Product Security has rated this update as having Critical secur ...
Adobe Flash Player before 1800324 and 19x and 20x before 2000267 on Windows and OS X and before 112202559 on Linux, Adobe AIR before 2000233, Adobe AIR SDK before 2000233, and Adobe AIR SDK & Compiler before 2000233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vec ...

Exploits

Source: codegooglecom/p/google-security-research/issues/detail?id=627 The attached swf file causes an out-of-bounds memset in BlurFilter processing Note that Chrome aborts when processing the swf Proof of Concept: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39219zip ...

Github Repositories

A scraper (Mitre CVE database + GZD team's database) and short analysis on timing of vulnerability finding/fixing

GZD + Mitre This code (work in progress) scrapes the Mitre CVE database and compares it against the google zero day (GZD) team's database cvemitreorg/data/downloads/indexhtml bugschromiumorg/p/project-zero/issues/list?can=1&q=&sort=-id&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary Intent GZD team's