CVE-2015-3043
KEV
🔴 Łataj teraz
Wykorzystanie nieokreślonych wektorów w Adobe Flash Player umożliwia zdalne wykonanie kodu.
CVSS
9.8
EPSS
87.4%
Exploit
weaponized
Vendor
redhat
Opis źródłowy (NVD)
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042.
dos exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 87.4% |
| Opublikowano (NVD) | 2015-04-14 22:59:21 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 21:09:08 UTC |
Referencje
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://rhn.redhat.com/errata/RHSA-2015-0813.html (psirt@adobe.com) [Third Party Advisory]
- http://www.securityfocus.com/bid/74062 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1032105 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html (psirt@adobe.com) [Broken Link, Patch, Vendor Advisory]
- https://security.gentoo.org/glsa/201504-07 (psirt@adobe.com) [Third Party Advisory]
- https://www.exploit-db.com/exploits/37536/ (psirt@adobe.com) [Exploit, Third Party Advisory, VDB Entry]
- https://github.com/cisagov/vulnrichment/issues/196 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [Issue Tracking]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-3043 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]