Unknown
CVE-2015-8651
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2015-8651
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Integer overflow in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- adobe,
- hp,
- opensuse,
- redhat,
- suse
Products
- air,
- air sdk,
- air sdk & compiler,
- enterprise linux desktop 5.0,
- enterprise linux desktop 6.0,
- enterprise linux server 5.0,
- enterprise linux server 6.0,
- enterprise linux workstation 5.0,
- enterprise linux workstation 6.0,
- evergreen 11.4,
- flash player,
- insight control,
- insight control server provisioning,
- linux enterprise desktop 11,
- linux enterprise desktop 12,
- linux enterprise workstation extension 12,
- matrix operating environment 7.6,
- opensuse 13.1,
- opensuse 13.2,
- system management homepage,
- systems insight manager,
- version control repository manager
Exploited in the Wild
Would you like to delete this Exploited in the Wild Report?
Yes, delete this reportWould you like to delete this Exploited in the Wild Report?
Yes, delete this reportReferences
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: