{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T10:19:04.879","vulnerabilities":[{"cve":{"id":"CVE-2015-3106","sourceIdentifier":"psirt@adobe.com","published":"2015-06-10T01:59:47.863","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3107."},{"lang":"es","value":"Vulnerabilidad de uso después de liberación en Adobe Flash Player anterior a 13.0.0.292 y 14.x hasta 18.x anterior a 18.0.0.160 en Windows y OS X y anterior a 11.2.202.466 en Linux, Adobe AIR anterior a 18.0.0.144 en Windows y anterior a 18.0.0.143 en OS X y Android, Adobe AIR SDK anterior a 18.0.0.144 en Windows y anterior a 18.0.0.143 en OS X, y Adobe AIR SDK & Compiler anterior a 18.0.0.144 en Windows y anterior a 18.0.0.143 en OS X permite a atacantes ejecutar código arbitrario a través de vectores no especificados, una vulnerabilidad diferente a CVE-2015-3103 y CVE-2015-3107."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","versionEndIncluding":"17.0.0.172","matchCriteriaId":"A4D3CA52-FE42-4B46-92FF-E8B027F586BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*","versionEndIncluding":"17.0.0.172","matchCriteriaId":"7F5DDA65-B2BF-4299-9A1E-C61BB08A70FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*","versionEndIncluding":"17.0.0.172","matchCriteriaId":"2E9D89B2-3A2E-406F-8DD4-19078091E7F5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","matchCriteriaId":"4781BF1E-8A4E-4AFF-9540-23D523EE30DD"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionEndIncluding":"11.2.202.460","matchCriteriaId":"47355444-CF3A-4150-9757-46B5A431865F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","matchCriteriaId":"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*","versionEndIncluding":"17.0.0.144","matchCriteriaId":"5EA9C9E9-32C6-40F1-920D-970ABA6A94FB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","matchCriteriaId":"8255F035-04C8-4158-B301-82101711939C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*","versionEndIncluding":"13.0.0.289","matchCriteriaId":"E2E515D4-87A7-4CB5-8C91-0A95BE8F283B"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*","matchCriteriaId":"D5D7202D-56DF-400B-9F09-E7D9938222D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*","matchCriteriaId":"4D4F0D21-A64B-46C1-9591-96529661DF0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*","matchCriteriaId":"86961019-3B81-458E-949F-A2F006EA55FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*","matchCriteriaId":"25895BE9-71FD-4DE7-90FC-0199470A8738"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*","matchCriteriaId":"4D55A950-7D48-413C-AD43-6AC64FBE790C"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*","matchCriteriaId":"F1A22B74-453D-4A8A-B79A-2B3143A0D995"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*","matchCriteriaId":"3FE4B077-67D1-4B25-976E-715FB6B2A1D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*","matchCriteriaId":"BFC91B68-6B35-47BD-BC02-3F836E772CF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*","matchCriteriaId":"A3BE6004-C30A-46E2-9F25-785E12BBF640"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*","matchCriteriaId":"CFE8E51F-7A32-41A4-B03A-73E52EB64C04"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*","matchCriteriaId":"3E13E927-A77C-4681-AFDE-A5A14093234D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*","matchCriteriaId":"27629FF0-5EB9-476F-B5B3-115F663AB65E"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*","matchCriteriaId":"C0AB583F-3EBD-47B6-975E-7754CC32CCA7"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*","matchCriteriaId":"B58DE1A9-0510-4B65-AB18-75F9263A7818"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*","matchCriteriaId":"1BC4FAD0-4A54-4EDF-BE39-28138B34E719"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*","matchCriteriaId":"BE1FBC20-3DE6-4426-9E97-42AFCEF8CEE4"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:flash_player:17.0.0.188:*:*:*:*:*:*:*","matchCriteriaId":"40EF2221-DE87-4D8F-B92D-8FD21EEBEABA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","matchCriteriaId":"4781BF1E-8A4E-4AFF-9540-23D523EE30DD"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html","source":"psirt@adobe.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html","source":"psirt@adobe.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html","source":"psirt@adobe.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1086.html","source":"psirt@adobe.com"},{"url":"http://www.securityfocus.com/bid/75087","source":"psirt@adobe.com"},{"url":"http://www.securitytracker.com/id/1032519","source":"psirt@adobe.com"},{"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-11.html","source":"psirt@adobe.com","tags":["Patch","Vendor Advisory"]},{"url":"https://security.gentoo.org/glsa/201506-01","source":"psirt@adobe.com"},{"url":"https://www.exploit-db.com/exploits/37847/","source":"psirt@adobe.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1086.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/75087","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id/1032519","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://helpx.adobe.com/security/products/flash-player/apsb15-11.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://security.gentoo.org/glsa/201506-01","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/37847/","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorComment":"CWE-416: Use After Free"}}]}