ID

VAR-201507-0105


CVE

CVE-2015-5122


TITLE

Adobe Flash ActionScript 3 opaqueBackground use-after-free vulnerability

Trust: 0.8

sources: CERT/CC: VU#338736

DESCRIPTION

Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015. Adobe Flash Player freed memory use (use-after-free) Vulnerability exists. Adobe Flash Player for, ActionScript 3 of opaqueBackground Use of freed memory due to processing (use-after-free) This vulnerability can be exploited to corrupt memory. Proof-of-Concept The code is publicly available. opaqueBackgroundhttp://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/display/DisplayObject.html#opaqueBackground note that, National Vulnerability Database (NVD) Then CWE-416 It is published as. CWE-416: Use After Freehttp://cwe.mitre.org/data/definitions/416.htmlA user of the product may be infected with a maliciously crafted Flash Accessing websites containing crafted content or Microsoft Office By opening a document, arbitrary code may be executed on the user's web browser. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. The product enables viewing of applications, content and video across screens and browsers. ActionScript 3 (AS3) is an object-oriented programming language developed by Adobe for its Flash product. (widely exploited in July 2015). Background ========== The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508" References ========== [ 1 ] CVE-2015-3107 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107 [ 2 ] CVE-2015-5122 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122 [ 3 ] CVE-2015-5123 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123 [ 4 ] CVE-2015-5124 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124 [ 5 ] CVE-2015-5125 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125 [ 6 ] CVE-2015-5127 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127 [ 7 ] CVE-2015-5129 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129 [ 8 ] CVE-2015-5130 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130 [ 9 ] CVE-2015-5131 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131 [ 10 ] CVE-2015-5132 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132 [ 11 ] CVE-2015-5133 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133 [ 12 ] CVE-2015-5134 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134 [ 13 ] CVE-2015-5539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539 [ 14 ] CVE-2015-5540 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540 [ 15 ] CVE-2015-5541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541 [ 16 ] CVE-2015-5544 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544 [ 17 ] CVE-2015-5545 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545 [ 18 ] CVE-2015-5546 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546 [ 19 ] CVE-2015-5547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547 [ 20 ] CVE-2015-5548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548 [ 21 ] CVE-2015-5549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549 [ 22 ] CVE-2015-5550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550 [ 23 ] CVE-2015-5551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551 [ 24 ] CVE-2015-5552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552 [ 25 ] CVE-2015-5553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553 [ 26 ] CVE-2015-5554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554 [ 27 ] CVE-2015-5555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555 [ 28 ] CVE-2015-5556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556 [ 29 ] CVE-2015-5557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557 [ 30 ] CVE-2015-5558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558 [ 31 ] CVE-2015-5559 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559 [ 32 ] CVE-2015-5560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560 [ 33 ] CVE-2015-5561 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561 [ 34 ] CVE-2015-5562 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562 [ 35 ] CVE-2015-5563 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563 [ 36 ] CVE-2015-5564 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564 [ 37 ] CVE-2015-5965 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201508-01 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2015:1235-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1235.html Issue date: 2015-07-16 CVE Names: CVE-2015-5122 CVE-2015-5123 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes two security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. These vulnerabilities are detailed in the Adobe Security Bulletin APSB15-18 listed in the References section. Two flaws were found in the way flash-plugin displayed certain SWF content. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1242216 - CVE-2015-5122 CVE-2015-5123 flash-plugin: two code execution issues in APSA15-04 / APSB15-18 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.491-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.491-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.491-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.491-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.491-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.491-1.el6_6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.491-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.491-1.el6_6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.491-1.el6_6.i686.rpm x86_64: flash-plugin-11.2.202.491-1.el6_6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5122 https://access.redhat.com/security/cve/CVE-2015-5123 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb15-18.html https://helpx.adobe.com/security/products/flash-player/apsa15-04.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVp+WCXlSAg2UNWIIRAsPvAKC4jqtQIpeXv33Wj/vKMotQ4sdPZwCgibDD MzLG3LQTopnph72hflS2aDE= =XzfT -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04796784 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04796784 Version: 1 HPSBHF03509 rev.1 - HP ThinPro and Smart Zero Core, Remote Denial of Service, Unauthorized Access to Data NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-09-14 Last Updated: 2015-09-14 Potential Security Impact: Remote Denial of Service (DoS), Unauthorized Access to Data Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY HP has released updates to the HP ThinPro and HP Smart Zero Core operating systems to address two vulnerabilities found in Adobe Flash Player versions v11.x through v11.2.202.481 on Linux. References: CVE-2015-5122 CVE-2015-5123 SSRT102253 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Smart Zero Core v4.4 HP Smart Zero Core v5.0 HP Smart Zero Core v5.1 HP Smart Zero Core v5.2 HP ThinPro v4.4 HP ThinPro v5.0 HP ThinPro v5.1 HP ThinPro v5.2 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-5122 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2015-5123 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has released updates to the HP ThinPro and HP Smart Zero Core operating systems to address these Adobe Flash Player vulnerabilities. HP ThinPro 4.4 and HP Smart Zero Core 4.4 http://ftp.hp.com/pub/tcdebian/upda tes/4.4/service_packs/flash11.2.202.491-4.4-5.2-x86.xar HP ThinPro 5.0 and HP Smart Zero Core 5.0 http://ftp.hp.com/pub/tcdebian/upda tes/5.0/service_packs/flash11.2.202.491-4.4-5.2-x86.xar HP ThinPro 5.1 and HP Smart Zero Core 5.1 http://ftp.hp.com/pub/tcdebian/upda tes/5.1/service_packs/flash11.2.202.491-4.4-5.2-x86.xar HP ThinPro 5.2 and HP Smart Zero Core 5.2 ( http://ftp.hp.com/pub/tcdebian/up dates/5.2/service_packs/flash11.2.202.491-4.4-5.2-x86.xar HISTORY Version:1 (rev.1) - 14 September 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. The vulnerabilities could be exploited remotely resulting in execution of code or Denial of Service (DoS). - iMC PLAT prior to 7.1 E0303P16 - iMC SHM prior to 7.1 E0301P05 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-3113 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2015-5122 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HPE has provided the following software updates to resolve the vulnerabilities in iMC SHM and iMC PLAT. + iMC SHM 7.1 E0301P05 or later for the following Products/SKUs: - JG398A HP IMC Service Health Manager Software Module License - JG398AAE HP IMC Service Health Manager Software Module E-LTU + iMC PLAT 7.1 E0303P16 or later for the following Products/SKUs: - JD125A HP IMC Std S/W Platform w/100-node - JD126A HP IMC Ent S/W Platform w/100-node - JD808A HP IMC Ent Platform w/100-node License - JD814A HP A-IMC Enterprise Edition Software DVD Media - JD815A HP IMC Std Platform w/100-node License - JD816A HP A-IMC Standard Edition Software DVD Media - JF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU - JF289AAE HP Enterprise Management System to Intelligent Management Center Upgrade E-LTU - JF377A HP IMC Std S/W Platform w/100-node Lic - JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU - JF378A HP IMC Ent S/W Platform w/200-node Lic - JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU - JG546AAE HP IMC Basic SW Platform w/50-node E-LTU - JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU - JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU - JG550AAE HP PMM to IMC Bsc WLM Upgr w/150AP E-LTU - JG590AAE HP IMC Bsc WLAN Mgr SW Pltfm 50 AP E-LTU - JG659AAE HP IMC Smart Connect VAE E-LTU - JG660AAE HP IMC Smart Connect w/WLM VAE E-LTU - JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU - JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU - JG766AAE HP IMC SmCnct Vrtl Applnc SW E-LTU - JG767AAE HP IMC SmCnct WSM Vrtl Applnc SW E-LTU - JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU HISTORY Version:1 (rev.1) - 28 January 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy

Trust: 4.14

sources: NVD: CVE-2015-5122 // CERT/CC: VU#338736 // CERT/CC: VU#561288 // JVNDB: JVNDB-2015-003533 // BID: 75568 // BID: 75712 // VULHUB: VHN-83083 // VULMON: CVE-2015-5122 // PACKETSTORM: 133099 // PACKETSTORM: 132713 // PACKETSTORM: 133562 // PACKETSTORM: 135499

AFFECTED PRODUCTS

vendor:adobemodel: - scope: - version: -

Trust: 1.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.468

Trust: 1.2

vendor:adobemodel:flash playerscope:eqversion:11.2.202.451

Trust: 1.2

vendor:adobemodel:flash playerscope:eqversion:11.2.202.442

Trust: 1.2

vendor:adobemodel:flash playerscope:eqversion:11.2.202.440

Trust: 1.2

vendor:adobemodel:flash playerscope:eqversion:11.2.202.438

Trust: 1.2

vendor:adobemodel:flash playerscope:eqversion:11.2.202.429

Trust: 1.2

vendor:adobemodel:flash playerscope:eqversion:11.2.202.424

Trust: 1.2

vendor:adobemodel:flash playerscope:eqversion:11.2.202.411

Trust: 1.2

vendor:redhatmodel:enterprise linux serverscope:eqversion:5.0

Trust: 1.0

vendor:opensusemodel:evergreenscope:eqversion:11.4

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:susemodel:linux enterprise workstation extensionscope:eqversion:12

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:11.2.202.481

Trust: 1.0

vendor:adobemodel:flash player desktop runtimescope:lteversion:18.0.0.203

Trust: 1.0

vendor:adobemodel:flash playerscope:gteversion:18.0

Trust: 1.0

vendor:adobemodel:flash playerscope:gteversion:13.0

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:13.0.0.302

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:18.0.0.204

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:flash playerscope:gteversion:11.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:5.0

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:18.0.0.203

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.6

Trust: 1.0

vendor:adobemodel:flash player desktop runtimescope:gteversion:18.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:5.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:18.0.0.204

Trust: 0.9

vendor:アドビmodel:adobe flash playerscope:eqversion: -

Trust: 0.8

vendor:アドビmodel:adobe flash playerscope:eqversion:9.0 to 18.0.0.204 to

Trust: 0.8

vendor:susemodel:opensuse evergreenscope:eqversion:11.4

Trust: 0.6

vendor:redhatmodel:enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux server supplementaryscope:eqversion:6

Trust: 0.6

vendor:redhatmodel:enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:16.0235

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:14.0179

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:14.0177

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:14.0176

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0259

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0252

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0214

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0182

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:12.070

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700275

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700232

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700169

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.6.602105

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.5.502131

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.5.502124

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.5.502118

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.5.50080

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.4.400231

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.300271

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.300270

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.300268

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.300265

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.300262

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.300257

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.300250

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.300231

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.300214

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.20295

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202425

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202418

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202400

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202359

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202350

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202346

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202341

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202297

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202280

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202238

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202236

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202221

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202197

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202160

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.11569

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.11554

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.11164

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.11150

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.0.198

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.0.160

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.0.1129

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.53.64

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.51.66

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.0.452

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.0.3218

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.0.22.87

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.0.15.3

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.0.12.36

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.0.12.35

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.262

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.2460

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.152.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.151.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.124.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.9.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.8.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.48.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.47.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.45.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.31.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.289.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.283.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.280

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.28.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.277.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.262.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.260.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.246.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.159.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.155.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9.0.115.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:9

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:8.0.35.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:8.0.34.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:8

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.73.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.70.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.69.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.68.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.67.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.66.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.61.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.60.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.53.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.24.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.19.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7.0.14.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:7

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:6.0.79

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:6.0.21.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:4

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:3

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:2

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:18.0.0.194

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:18.0.0.161

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:18.0.0.160

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:18.0.0.143

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:17.0.0.188

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:17.0.0.169

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:17.0.0.134

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:16.0.0.305

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:16.0.0.296

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:16.0.0.291

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:16.0.0.287

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:16.0.0.257

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:16.0.0.234

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:15.0.0.246

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:15.0.0.242

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:15.0.0.239

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:15.0.0.223

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:15.0.0.189

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:15.0.0.152

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:14.0.0.145

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:14.0.0.125

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.296

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.292

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.289

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.281

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.277

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.269

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.264

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.262

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.260

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.258

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.250

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.244

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.241

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.231

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.223

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.206

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:13.0.0.201

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:12.0.0.77

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:12.0.0.44

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:12.0.0.43

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:12.0.0.41

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:12.0.0.38

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:12

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.9.900.170

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.9.900.152

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.9.900.117

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.8.800.97

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.8.800.94

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.8.800.170

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.8.800.168

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.279

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.272

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.269

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.261

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.260

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.257

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.252

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.242

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.225

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.224

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.203

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.7.700.202

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.6.602.180

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.6.602.171

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.6.602.168

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.6.602.167

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.5.502.149

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.5.502.146

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.5.502.136

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.5.502.135

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.5.502.110

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.4.402.287

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.4.402.278

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.4.402.265

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.378.5

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.31.230

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.3.300.273

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.466

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.460

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.457

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.406

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.394

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.378

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.356

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.336

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.335

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.332

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.327

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.310

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.291

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.285

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.275

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.273

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.270

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.262

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.261

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.258

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.251

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.243

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.238

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.235

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.233

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.229

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.223

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.115.81

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.115.8

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.115.7

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.115.63

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.115.6

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.115.59

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.115.58

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.115.48

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.115.34

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.115.11

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.112.61

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.111.9

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.111.8

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.111.73

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.111.7

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.111.6

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.111.54

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.111.5

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.111.44

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.111.10

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.102.63

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.102.62

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.102.59

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.102.55

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1.102.228

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.1

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.0.1.153

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.0.1.152

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.0

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.186.7

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.186.6

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.186.3

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.186.2

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.185.25

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.185.24

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.185.23

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.185.22

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.185.21

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.86

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.75

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.7

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.68

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.67

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.63

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.61

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.51

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.50

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.5

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.48

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.43

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.4

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.29

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.25

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.23

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.20

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.19

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.16

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.15

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.11

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.183.10

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.181.34

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.181.26

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.181.23

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.181.22

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.181.16

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.3.181.14

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.159.1

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.157.51

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.156.12

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.154.28

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.154.27

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.154.25

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.154.24

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.154.18

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.154.13

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.153.1

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.152.33

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.152.32

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.152.26

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.152.21

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.2.152

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.95.2

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.95.1

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.92.8

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.92.10

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.85.3

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.82.76

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.52.15

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.52.14.1

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.52.14

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.106.17

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.106.16

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.105.6

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.102.65

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1.102.64

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.1

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.0.42.34

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.0.32.18

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10.0.2.54

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:10

Trust: 0.6

vendor:adobemodel:flash playerscope:eqversion:11.2.202.425

Trust: 0.6

vendor:redhatmodel:rhel supplementary serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:rhel desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux server supplementary eus 6.6.zscope: - version: -

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:11

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:10

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:15.0356

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:14.0178

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:13.083

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:13.0111

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:4.0.0.1390

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:3.9.0.1380

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:18.0.0.144

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:18.0.0.143

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:17.0.0.172

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:17.0.0.144

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:16.0.0.272

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:15.0.0.302

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:15.0.0.249

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:14.0.0.179

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:14.0.0.137

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:14.0.0.110

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.7.0.16600

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.7.0.15300

Trust: 0.3

vendor:adobemodel:airscope:eqversion:15.0356

Trust: 0.3

vendor:adobemodel:airscope:eqversion:14.0179

Trust: 0.3

vendor:adobemodel:airscope:eqversion:14.0178

Trust: 0.3

vendor:adobemodel:airscope:eqversion:13.083

Trust: 0.3

vendor:adobemodel:airscope:eqversion:13.0111

Trust: 0.3

vendor:adobemodel:airscope:eqversion:4.01628

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:4.01390

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.71860

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.71660

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.71530

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.33610

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.4

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.3

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3.9130

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3.9120

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:4.0.0.1390

Trust: 0.3

vendor:adobemodel:airscope:eqversion:4

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.9.0.1380

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.9.0.1210

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.9.0.1060

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.8.0.910

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.8.0.870

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.8.0.1430

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.7.0.2100

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.7.0.2090

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.6.0.6090

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.6.0.599

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.6.0.597

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.5.0.890

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.5.0.880

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.5.0.600

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.5.0.1060

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.4.0.2710

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.4.0.2540

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.3.0.3690

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.3.0.3670

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.2.0.2080

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.2.0.2070

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.2.0.207

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.1.0.4880

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.1.0.488

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.1.0.485

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.0.0.4080

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.0.0.408

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1.19610

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1.1961

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.0.19530

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.0.1953

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.0.19480

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.0.1948

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.19140

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.19120

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.0.19140

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.0.19120

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.5.1.17730

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.5.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.5.0.16600

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.3.13070

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.2.12610

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:18.0.0.144

Trust: 0.3

vendor:adobemodel:airscope:eqversion:18.0.0.143

Trust: 0.3

vendor:adobemodel:airscope:eqversion:17.0.0.172

Trust: 0.3

vendor:adobemodel:airscope:eqversion:17.0.0.144

Trust: 0.3

vendor:adobemodel:airscope:eqversion:16.0.0.272

Trust: 0.3

vendor:adobemodel:airscope:eqversion:16.0.0.245

Trust: 0.3

vendor:adobemodel:airscope:eqversion:15.0.0.293

Trust: 0.3

vendor:adobemodel:airscope:eqversion:15.0.0.252

Trust: 0.3

vendor:adobemodel:airscope:eqversion:15.0.0.249

Trust: 0.3

vendor:adobemodel:airscope:eqversion:14.0.0.137

Trust: 0.3

vendor:adobemodel:airscope:eqversion:14.0.0.110

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.1.8210

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.0.7220

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.1.0.5790

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.01

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.0.8.4990

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.0.4990

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.0.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.0

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:18.0.0.204

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:18.0.0.203

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:13.0.0.302

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:11.2.202.481

Trust: 0.3

vendor:adobemodel:air sdkscope:neversion:18.0.0.180

Trust: 0.3

vendor:adobemodel:airscope:neversion:18.0.0.180

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.2.6

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.0

Trust: 0.3

vendor:hpmodel:version control repository managerscope:eqversion:7.2.2

Trust: 0.3

vendor:hpmodel:insight orchestrationscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:insight orchestrationscope:neversion:7.5.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.2.2

Trust: 0.3

vendor:hpmodel:version control agentscope:neversion:7.5.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.7

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.2.2

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:7.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.2.77

Trust: 0.3

vendor:hpmodel:imc platscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2.27

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.2.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.12

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.10

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.6

Trust: 0.3

vendor:hpmodel:thinproscope:eqversion:4.4

Trust: 0.3

vendor:hpmodel:imc plat e0303p16scope:neversion:7.1

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:7.2.1

Trust: 0.3

vendor:hpmodel:version control repository managerscope:eqversion:7.3

Trust: 0.3

vendor:hpmodel:thinproscope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:smart zero corescope:eqversion:4.4

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.1

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:7.3.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.2.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.68

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.3.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:7.5

Trust: 0.3

vendor:redhatmodel:enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.2.9.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.302

Trust: 0.3

vendor:hpmodel:imc plat e0303p06scope:eqversion:7.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.2.2

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:7.3.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.3

Trust: 0.3

vendor:hpmodel:imc shm e0301p05scope:neversion:7.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.2.4.1

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:2.1.5

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.15

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:18.0.0.203

Trust: 0.3

vendor:hpmodel:thinproscope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:version control repository managerscope:eqversion:7.4.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.8

Trust: 0.3

vendor:hpmodel:version control repository managerscope:eqversion:7.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.64

Trust: 0.3

vendor:hpmodel:smart zero corescope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.2.8

Trust: 0.3

vendor:hpmodel:imc shmscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.1.1

Trust: 0.3

vendor:hpmodel:version control repository manager 7.4.0ascope: - version: -

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.1

Trust: 0.3

vendor:hpmodel:virtual connect enterprise managerscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.3

Trust: 0.3

vendor:hpmodel:version control repository managerscope:eqversion:7.3.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.2

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:7.3

Trust: 0.3

vendor:hpmodel:virtual connect enterprise managerscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.3.2

Trust: 0.3

vendor:hpmodel:thinproscope:eqversion:5.2

Trust: 0.3

vendor:hpmodel:version control repository managerscope:eqversion:7.4

Trust: 0.3

vendor:hpmodel:version control repository managerscope:eqversion:7.3.3

Trust: 0.3

vendor:hpmodel:smart zero corescope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:virtual connect enterprise manager sdkscope:neversion:7.5.0

Trust: 0.3

vendor:hpmodel:insight orchestrationscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:smart zero corescope:eqversion:5.2

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:7.3.4

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.4

Trust: 0.3

vendor:hpmodel:version control repository managerscope:eqversion:7.3.1

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:7.3.5

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.11

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:7.2.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.1.2

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.1.1

Trust: 0.3

vendor:hpmodel:version control repository managerscope:neversion:7.5.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.3.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.3

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.3.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.3.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.5

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.3.3.1

Trust: 0.3

vendor:hpmodel:virtual connect enterprise managerscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:version control agentscope:eqversion:7.3.2

Trust: 0.3

vendor:hpmodel:version control repository managerscope:eqversion:7.2.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:7.4

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.2.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.9

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.2.7

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.4

Trust: 0.3

vendor:hpmodel:insight orchestrationscope:eqversion:6.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.481

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:systems insight managerscope:neversion:7.5.0

Trust: 0.3

vendor:hpmodel:version control repository managerscope:eqversion:7.3.4

Trust: 0.3

sources: CERT/CC: VU#338736 // CERT/CC: VU#561288 // BID: 75568 // BID: 75712 // JVNDB: JVNDB-2015-003533 // CNNVD: CNNVD-201507-357 // NVD: CVE-2015-5122

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5122
value: CRITICAL

Trust: 1.0

NVD: CVE-2015-5122
value: HIGH

Trust: 0.8

NVD: CVE-2015-5119
value: HIGH

Trust: 0.8

OTHER: JVNDB-2015-003533
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201507-357
value: CRITICAL

Trust: 0.6

VULHUB: VHN-83083
value: HIGH

Trust: 0.1

VULMON: CVE-2015-5122
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-5122
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2015-5122
severity: HIGH
baseScore: 7.5
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

NVD: CVE-2015-5119
severity: HIGH
baseScore: 7.5
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

OTHER: JVNDB-2015-003533
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-83083
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-5122
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2015-003533
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CERT/CC: VU#338736 // CERT/CC: VU#561288 // VULHUB: VHN-83083 // VULMON: CVE-2015-5122 // JVNDB: JVNDB-2015-003533 // CNNVD: CNNVD-201507-357 // NVD: CVE-2015-5122

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.0

problemtype:Use of freed memory (CWE-416) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2015-003533 // NVD: CVE-2015-5122

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 133099 // PACKETSTORM: 133562 // CNNVD: CNNVD-201507-357

TYPE

Unknown

Trust: 0.6

sources: BID: 75568 // BID: 75712

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#338736 // CERT/CC: VU#561288 // VULHUB: VHN-83083 // VULMON: CVE-2015-5122

PATCH

title:adobe   systems company  Adobe Flash Player  Notice regarding the vulnerability ofurl:https://helpx.adobe.com/jp/flash-player/kb/230810.html

Trust: 0.8

title:The Registerurl:https://www.theregister.co.uk/2016/01/28/angler_exploit_kit_now_hooking_execs_with_xmas_flash_hole/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2016/01/11/exploit_kits_throw_flash_bash_party_invites_crypt0l0cker_spam_bots/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2015/07/21/the_roots_go_deep_kill_adobe_flash_kill_it_everywhere_bod_says/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2015/07/16/mozilla_unblocks_flash_firefox/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2015/07/14/adobe_flash_patch_tuesday/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2015/07/14/firefox_blocks_flash/

Trust: 0.2

title:The Registerurl:https://www.theregister.co.uk/2015/07/12/adobe_flash_zero_day_cve_2015_5122/

Trust: 0.2

title:Red Hat: CVE-2015-5122url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-5122

Trust: 0.1

title:Adobe-Flash-Exploits_17-18url:https://github.com/Xattam1/Adobe-Flash-Exploits_CVE-2015-3090_CVE-2015-3105_CVE-2015-5119_CVE-2015-5122

Trust: 0.1

title:Adobe-Flash-Exploits_17-18url:https://github.com/Xattam1/Adobe-Flash-Exploits_17-18

Trust: 0.1

title:APTnotesurl:https://github.com/s0wr0b1ndef/APTnotes

Trust: 0.1

title:APTnotesurl:https://github.com/kbandla/APTnotes

Trust: 0.1

title:AOTurl:https://github.com/cone4/AOT

Trust: 0.1

title:APT_CyberCriminal_Campagin_Collectionsurl:https://github.com/denmilu/APT_CyberCriminal_Campagin_Collections

Trust: 0.1

title:CVE-Studyurl:https://github.com/thdusdl1219/CVE-Study

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/usa-is-the-top-country-for-hosting-malicious-domains-according-to-report/

Trust: 0.1

title:Threatposturl:https://threatpost.com/updated-rig-exploit-kit-closing-in-on-1-million-victims/114108/

Trust: 0.1

title:Threatposturl:https://threatpost.com/new-campaign-targeting-japanese-with-hackingteam-zero-day/113848/

Trust: 0.1

title:Threatposturl:https://threatpost.com/flash-player-update-patches-two-hacking-team-zero-days/113776/

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2015/07/14/adobe_response_to_security_holes/

Trust: 0.1

title:Threatposturl:https://threatpost.com/hacking-team-promises-to-rebuild-controversial-surveillance-software/113743/

Trust: 0.1

sources: VULMON: CVE-2015-5122 // JVNDB: JVNDB-2015-003533

EXTERNAL IDS

db:NVDid:CVE-2015-5122

Trust: 5.2

db:CERT/CCid:VU#338736

Trust: 3.7

db:USCERTid:TA15-195A

Trust: 2.6

db:BIDid:75712

Trust: 2.1

db:PACKETSTORMid:132663

Trust: 1.8

db:EXPLOIT-DBid:37599

Trust: 1.8

db:SECTRACKid:1032890

Trust: 1.8

db:CERT/CCid:VU#561288

Trust: 1.1

db:JVNid:JVNVU93769860

Trust: 0.8

db:JVNDBid:JVNDB-2015-003533

Trust: 0.8

db:CNNVDid:CNNVD-201507-357

Trust: 0.7

db:BIDid:75568

Trust: 0.3

db:PACKETSTORMid:133562

Trust: 0.2

db:PACKETSTORMid:132713

Trust: 0.2

db:VULHUBid:VHN-83083

Trust: 0.1

db:VULMONid:CVE-2015-5122

Trust: 0.1

db:PACKETSTORMid:133099

Trust: 0.1

db:PACKETSTORMid:135499

Trust: 0.1

sources: CERT/CC: VU#338736 // CERT/CC: VU#561288 // VULHUB: VHN-83083 // VULMON: CVE-2015-5122 // BID: 75568 // BID: 75712 // JVNDB: JVNDB-2015-003533 // PACKETSTORM: 133099 // PACKETSTORM: 132713 // PACKETSTORM: 133562 // PACKETSTORM: 135499 // CNNVD: CNNVD-201507-357 // NVD: CVE-2015-5122

REFERENCES

url:https://helpx.adobe.com/security/products/flash-player/apsa15-04.html

Trust: 3.0

url:https://www.fireeye.com/blog/threat-research/2015/07/cve-2015-5122_-_seco.html

Trust: 2.9

url:http://www.kb.cert.org/vuls/id/338736

Trust: 2.9

url:https://helpx.adobe.com/security/products/flash-player/apsb15-18.html

Trust: 2.7

url:http://www.us-cert.gov/ncas/alerts/ta15-195a

Trust: 2.6

url:https://helpx.adobe.com/security/products/flash-player/apsb15-16.html

Trust: 1.9

url:http://www.securityfocus.com/bid/75712

Trust: 1.9

url:https://www.exploit-db.com/exploits/37599/

Trust: 1.9

url:https://security.gentoo.org/glsa/201508-01

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2015-1235.html

Trust: 1.9

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04952467

Trust: 1.8

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04796784

Trust: 1.8

url:http://packetstormsecurity.com/files/132663/adobe-flash-opaquebackground-use-after-free.html

Trust: 1.8

url:http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_opaque_background_uaf

Trust: 1.8

url:https://perception-point.io/2018/04/11/breaking-cfi-cve-2015-5122-coop/

Trust: 1.8

url:https://perception-point.io/new/breaking-cfi.php

Trust: 1.8

url:http://www.securitytracker.com/id/1032890

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html

Trust: 1.8

url:http://marc.info/?l=bugtraq&m=144050155601375&w=2

Trust: 1.7

url:http://www.microsoft.com/emet

Trust: 1.6

url:https://helpx.adobe.com/security/products/flash-player/apsa15-03.html

Trust: 1.1

url:https://twitter.com/w3bd3vil/status/618168863708962816

Trust: 1.1

url:http://malware.dontneedcoffee.com/2015/07/hackingteam-flash-0d-cve-2015-xxxx-and.html

Trust: 1.1

url:http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/

Trust: 1.1

url:https://krebsonsecurity.com/2015/07/adobe-to-fix-another-hacking-team-zero-day/

Trust: 0.8

url:http://help.adobe.com/en_us/flashplatform/reference/actionscript/3/flash/display/displayobject.html#opaquebackground

Trust: 0.8

url:http://www.howtogeek.com/188059/how-to-enable-click-to-play-plugins-in-every-web-browser

Trust: 0.8

url:https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-windows.html

Trust: 0.8

url:https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-mac-os.html

Trust: 0.8

url:http://help.adobe.com/en_us/flashplatform/reference/actionscript/3/flash/utils/bytearray.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu93769860/index.html

Trust: 0.8

url:http://jvn.jp/ta/jvnta97243368/

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5122

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20150713-adobeflashplayer.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2015/at150020.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2015/at150024.html

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/topics/?seq=16617

Trust: 0.8

url:https://cisa.gov/known-exploited-vulnerabilities-catalog

Trust: 0.8

url:http://www.howtogeek.com/188059/how-to-enable-click-to-play-plugins-in-every-web-browser/

Trust: 0.8

url:https://www.adobe.com/software/flash/about/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-5122

Trust: 0.4

url:https://github.com/rapid7/metasploit-framework/tree/master/data/exploits/cve-2015-5122

Trust: 0.3

url:https://technet.microsoft.com/library/security/2755801

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/561288

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04796784

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c04952467

Trust: 0.3

url:http://seclists.org/bugtraq/2015/aug/135

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-5123

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-5122

Trust: 0.2

url:http://marc.info/?l=bugtraq&amp;m=144050155601375&amp;w=2

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/updated-rig-exploit-kit-closing-in-on-1-million-victims/114108/

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=39884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5540

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5551

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5134

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5557

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5560

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5550

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5561

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5130

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5131

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5123

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5553

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5132

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5550

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5129

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3107

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5556

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5564

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5125

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5552

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5554

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5545

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5554

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5131

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5133

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5124

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5129

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5544

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5539

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5547

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3107

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5122

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5125

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5133

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5546

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5551

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5553

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5562

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5544

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5132

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5552

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5547

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5556

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5549

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5539

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5540

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5558

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5545

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5546

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5559

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5130

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5541

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5555

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5965

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5549

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5123

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/

Trust: 0.1

url:http://ftp.hp.com/pub/tcdebian/up

Trust: 0.1

url:http://ftp.hp.com/pub/tcdebian/upda

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3113

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

sources: CERT/CC: VU#338736 // CERT/CC: VU#561288 // VULHUB: VHN-83083 // VULMON: CVE-2015-5122 // BID: 75568 // BID: 75712 // JVNDB: JVNDB-2015-003533 // PACKETSTORM: 133099 // PACKETSTORM: 132713 // PACKETSTORM: 133562 // PACKETSTORM: 135499 // CNNVD: CNNVD-201507-357 // NVD: CVE-2015-5122

CREDITS

Google Project Zero and Morgan Marquis-Boire

Trust: 0.3

sources: BID: 75568

SOURCES

db:CERT/CCid:VU#338736
db:CERT/CCid:VU#561288
db:VULHUBid:VHN-83083
db:VULMONid:CVE-2015-5122
db:BIDid:75568
db:BIDid:75712
db:JVNDBid:JVNDB-2015-003533
db:PACKETSTORMid:133099
db:PACKETSTORMid:132713
db:PACKETSTORMid:133562
db:PACKETSTORMid:135499
db:CNNVDid:CNNVD-201507-357
db:NVDid:CVE-2015-5122

LAST UPDATE DATE

2024-12-11T20:39:49.663000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#338736date:2015-07-14T00:00:00
db:CERT/CCid:VU#561288date:2015-07-11T00:00:00
db:VULHUBid:VHN-83083date:2019-10-09T00:00:00
db:VULMONid:CVE-2015-5122date:2023-05-08T00:00:00
db:BIDid:75568date:2017-10-04T21:01:00
db:BIDid:75712date:2017-10-04T21:01:00
db:JVNDBid:JVNDB-2015-003533date:2024-07-08T05:38:00
db:CNNVDid:CNNVD-201507-357date:2019-08-20T00:00:00
db:NVDid:CVE-2015-5122date:2024-11-21T02:32:24.423

SOURCES RELEASE DATE

db:CERT/CCid:VU#338736date:2015-07-11T00:00:00
db:CERT/CCid:VU#561288date:2015-07-07T00:00:00
db:VULHUBid:VHN-83083date:2015-07-14T00:00:00
db:VULMONid:CVE-2015-5122date:2015-07-14T00:00:00
db:BIDid:75568date:2015-07-07T00:00:00
db:BIDid:75712date:2015-07-13T00:00:00
db:JVNDBid:JVNDB-2015-003533date:2015-07-13T00:00:00
db:PACKETSTORMid:133099date:2015-08-17T15:41:19
db:PACKETSTORMid:132713date:2015-07-16T19:04:43
db:PACKETSTORMid:133562date:2015-09-17T03:26:49
db:PACKETSTORMid:135499date:2016-01-29T14:06:11
db:CNNVDid:CNNVD-201507-357date:2015-07-15T00:00:00
db:NVDid:CVE-2015-5122date:2015-07-14T10:59:00.213