fkie_cve-2014-0500
Vulnerability from fkie_nvd
Published
2014-02-12 04:50
Modified
2024-11-21 02:02
Severity ?
Summary
Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | shockwave_player | * | |
adobe | shockwave_player | 11.0.0.456 | |
adobe | shockwave_player | 11.0.3.471 | |
adobe | shockwave_player | 11.5.0.595 | |
adobe | shockwave_player | 11.5.0.596 | |
adobe | shockwave_player | 11.5.1.601 | |
adobe | shockwave_player | 11.5.2.602 | |
adobe | shockwave_player | 11.5.6.606 | |
adobe | shockwave_player | 11.5.7.609 | |
adobe | shockwave_player | 11.5.8.612 | |
adobe | shockwave_player | 11.5.9.615 | |
adobe | shockwave_player | 11.5.9.620 | |
adobe | shockwave_player | 11.5.10.620 | |
adobe | shockwave_player | 11.6.0.626 | |
adobe | shockwave_player | 11.6.1.629 | |
adobe | shockwave_player | 11.6.3.633 | |
adobe | shockwave_player | 11.6.4.634 | |
adobe | shockwave_player | 11.6.5.635 | |
adobe | shockwave_player | 11.6.6.636 | |
adobe | shockwave_player | 11.6.7.637 | |
adobe | shockwave_player | 11.6.8.638 | |
adobe | shockwave_player | 12.0.0.112 | |
adobe | shockwave_player | 12.0.2.122 | |
adobe | shockwave_player | 12.0.3.133 | |
adobe | shockwave_player | 12.0.4.144 | |
adobe | shockwave_player | 12.0.6.147 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C4B100C-6C43-4BEF-AD9C-680C7764A41E", "versionEndIncluding": "12.0.7.148", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*", "matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*", "matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*", "matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*", "matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*", "matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*", "matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*", "matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*", "matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*", "matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*", "matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*", "matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*", "matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*", "matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*", "matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*", "matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.6.147:*:*:*:*:*:*:*", "matchCriteriaId": "FC110854-7ACE-44E5-B73A-8A1EBD2AD84A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501." }, { "lang": "es", "value": "Adobe Shockwave Player anterior a 12.0.9.149 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0501." } ], "id": "CVE-2014-0500", "lastModified": "2024-11-21T02:02:15.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-12T04:50:41.313", "references": [ { "source": "psirt@adobe.com", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "source": "psirt@adobe.com", "url": "http://osvdb.org/103157" }, { "source": "psirt@adobe.com", "url": "http://secunia.com/advisories/56740" }, { "source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/65490" }, { "source": "psirt@adobe.com", "url": "http://www.securitytracker.com/id/1029740" }, { "source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/103157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.