{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T20:40:25.976","vulnerabilities":[{"cve":{"id":"CVE-2015-0358","sourceIdentifier":"psirt@adobe.com","published":"2015-04-14T22:59:11.803","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-3039."},{"lang":"es","value":"Vulnerabilidad de uso después de liberación en Adobe Flash Player anterior a 13.0.0.281 y 14.x hasta 17.x anterior a 17.0.0.169 en Windows y OS X y anterior a 11.2.202.457 en Linux permite a atacantes ejecutar código arbitrario a través de vectores no especificados, una vulnerabilidad diferente a CVE-2015-0349, CVE-2015-0351, y CVE-2015-3039."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","matchCriteriaId":"A10BC294-9196-425F-9FB0-B1625465B47F"},{"vulnerable":true,"criteria":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","matchCriteriaId":"03117DF1-3BEC-4B8D-AD63-DBBDB2126081"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*","matchCriteriaId":"777F6902-6EFA-482A-9A17-48DA5BDDB9CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*","matchCriteriaId":"6ECE2BD2-7E6B-4474-B410-4A28ED8DB6A0"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux_workstation_extension:12.0:*:*:*:*:*:*:*","matchCriteriaId":"5FC37427-039A-4B66-B01A-4CA876819EF3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionEndIncluding":"11.2.202.451","matchCriteriaId":"EB3AED03-5107-4120-8815-55FF8EE41498"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","matchCriteriaId":"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*","matchCriteriaId":"CC2EDDE6-49F2-41D3-BCB2-F49886A2A170"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","matchCriteriaId":"B8C6E104-EDBC-481E-85B8-D39ED2058D39"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*","matchCriteriaId":"FB3FB071-FCCC-4425-AFBF-77287C1B8F7B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","matchCriteriaId":"4B74C62D-4A6D-4A4F-ADF6-A508322CD447"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*","matchCriteriaId":"04A2B180-08EF-4BE1-B1F2-48782874D6DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","matchCriteriaId":"6E89B38A-3697-46DD-BB3F-E8D2373588BE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionEndIncluding":"13.0.0.264","matchCriteriaId":"35A39AB2-E3C6-4C70-8CC9-0050184DB2B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*","matchCriteriaId":"D5D7202D-56DF-400B-9F09-E7D9938222D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*","matchCriteriaId":"4D4F0D21-A64B-46C1-9591-96529661DF0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*","matchCriteriaId":"86961019-3B81-458E-949F-A2F006EA55FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*","matchCriteriaId":"25895BE9-71FD-4DE7-90FC-0199470A8738"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*","matchCriteriaId":"4D55A950-7D48-413C-AD43-6AC64FBE790C"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*","matchCriteriaId":"F1A22B74-453D-4A8A-B79A-2B3143A0D995"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*","matchCriteriaId":"3FE4B077-67D1-4B25-976E-715FB6B2A1D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*","matchCriteriaId":"BFC91B68-6B35-47BD-BC02-3F836E772CF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*","matchCriteriaId":"A3BE6004-C30A-46E2-9F25-785E12BBF640"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*","matchCriteriaId":"CFE8E51F-7A32-41A4-B03A-73E52EB64C04"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*","matchCriteriaId":"3E13E927-A77C-4681-AFDE-A5A14093234D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*","matchCriteriaId":"27629FF0-5EB9-476F-B5B3-115F663AB65E"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*","matchCriteriaId":"C0AB583F-3EBD-47B6-975E-7754CC32CCA7"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*","matchCriteriaId":"B58DE1A9-0510-4B65-AB18-75F9263A7818"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*","matchCriteriaId":"1BC4FAD0-4A54-4EDF-BE39-28138B34E719"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","matchCriteriaId":"4781BF1E-8A4E-4AFF-9540-23D523EE30DD"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html","source":"psirt@adobe.com","tags":["Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html","source":"psirt@adobe.com","tags":["Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html","source":"psirt@adobe.com","tags":["Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html","source":"psirt@adobe.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0813.html","source":"psirt@adobe.com","tags":["Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/74064","source":"psirt@adobe.com"},{"url":"http://www.securitytracker.com/id/1032105","source":"psirt@adobe.com"},{"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-06.html","source":"psirt@adobe.com","tags":["Patch","Vendor Advisory"]},{"url":"https://security.gentoo.org/glsa/201504-07","source":"psirt@adobe.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0813.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/74064","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id/1032105","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://security.gentoo.org/glsa/201504-07","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorComment":"<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>"}}]}