ID

VAR-201508-0296


CVE

CVE-2015-5129


TITLE

Adobe Flash Player and Adobe AIR Heap-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-004075

DESCRIPTION

Heap-based buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5541. This vulnerability CVE-2015-5541 Is a different vulnerability.An attacker could execute arbitrary code. Failed attempts will likely cause a denial-of-service condition. The following products and versions are affected: Adobe Flash Player Desktop Runtime 18.0.0.209 and earlier versions and Adobe Flash Player Extended Support Release 13.0.0.309 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player for Windows, Macintosh and Linux platforms Google Chrome 18.0.0.209 and earlier, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 on Windows 10 18.0.0.209 and earlier, Adobe Flash Player for Internet Explorer 10 and 11 18.0.0.209 on Windows 8.0 and 8.1 and previous versions, Adobe Flash Player for Linux 11.2.202.491 and previous versions based on Linux platforms, AIR Desktop Runtime 18.0.0.180 and previous versions based on Windows and Macintosh platforms, and AIR SDK 18.0 based on Windows, Macintosh, Android and iOS platforms. 0.180 and earlier and AIR SDK & Compiler 18.0.0.180 and earlier. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2015:1603-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1603.html Issue date: 2015-08-12 CVE Names: CVE-2015-5127 CVE-2015-5128 CVE-2015-5129 CVE-2015-5130 CVE-2015-5131 CVE-2015-5132 CVE-2015-5133 CVE-2015-5134 CVE-2015-5539 CVE-2015-5540 CVE-2015-5541 CVE-2015-5544 CVE-2015-5545 CVE-2015-5546 CVE-2015-5547 CVE-2015-5548 CVE-2015-5549 CVE-2015-5550 CVE-2015-5551 CVE-2015-5552 CVE-2015-5553 CVE-2015-5554 CVE-2015-5555 CVE-2015-5556 CVE-2015-5557 CVE-2015-5558 CVE-2015-5559 CVE-2015-5560 CVE-2015-5561 CVE-2015-5562 CVE-2015-5563 CVE-2015-5564 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. These vulnerabilities are detailed in the Adobe Security Bulletin APSB15-19 listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130, CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5541, CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5550, CVE-2015-5551, CVE-2015-5552, CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556, CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560, CVE-2015-5561, CVE-2015-5562, CVE-2015-5563, CVE-2015-5564) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.508. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1252697 - flash-plugin: multiple code execution flaws (APSB15-19) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.508-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.508-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.508-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.508-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.508-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.508-1.el6_7.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.508-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.508-1.el6_7.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.508-1.el6_7.i686.rpm x86_64: flash-plugin-11.2.202.508-1.el6_7.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5127 https://access.redhat.com/security/cve/CVE-2015-5128 https://access.redhat.com/security/cve/CVE-2015-5129 https://access.redhat.com/security/cve/CVE-2015-5130 https://access.redhat.com/security/cve/CVE-2015-5131 https://access.redhat.com/security/cve/CVE-2015-5132 https://access.redhat.com/security/cve/CVE-2015-5133 https://access.redhat.com/security/cve/CVE-2015-5134 https://access.redhat.com/security/cve/CVE-2015-5539 https://access.redhat.com/security/cve/CVE-2015-5540 https://access.redhat.com/security/cve/CVE-2015-5541 https://access.redhat.com/security/cve/CVE-2015-5544 https://access.redhat.com/security/cve/CVE-2015-5545 https://access.redhat.com/security/cve/CVE-2015-5546 https://access.redhat.com/security/cve/CVE-2015-5547 https://access.redhat.com/security/cve/CVE-2015-5548 https://access.redhat.com/security/cve/CVE-2015-5549 https://access.redhat.com/security/cve/CVE-2015-5550 https://access.redhat.com/security/cve/CVE-2015-5551 https://access.redhat.com/security/cve/CVE-2015-5552 https://access.redhat.com/security/cve/CVE-2015-5553 https://access.redhat.com/security/cve/CVE-2015-5554 https://access.redhat.com/security/cve/CVE-2015-5555 https://access.redhat.com/security/cve/CVE-2015-5556 https://access.redhat.com/security/cve/CVE-2015-5557 https://access.redhat.com/security/cve/CVE-2015-5558 https://access.redhat.com/security/cve/CVE-2015-5559 https://access.redhat.com/security/cve/CVE-2015-5560 https://access.redhat.com/security/cve/CVE-2015-5561 https://access.redhat.com/security/cve/CVE-2015-5562 https://access.redhat.com/security/cve/CVE-2015-5563 https://access.redhat.com/security/cve/CVE-2015-5564 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb15-19.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVy2mAXlSAg2UNWIIRAty7AKCcTl+pzRlPMcYb+ESu7xg0C9nkVwCfbcNj SwY72oO+5brzzyYR9NLDDnE= =izmD -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Background ========== The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508" References ========== [ 1 ] CVE-2015-3107 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107 [ 2 ] CVE-2015-5122 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122 [ 3 ] CVE-2015-5123 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123 [ 4 ] CVE-2015-5124 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124 [ 5 ] CVE-2015-5125 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125 [ 6 ] CVE-2015-5127 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127 [ 7 ] CVE-2015-5129 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129 [ 8 ] CVE-2015-5130 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130 [ 9 ] CVE-2015-5131 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131 [ 10 ] CVE-2015-5132 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132 [ 11 ] CVE-2015-5133 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133 [ 12 ] CVE-2015-5134 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134 [ 13 ] CVE-2015-5539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539 [ 14 ] CVE-2015-5540 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540 [ 15 ] CVE-2015-5541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541 [ 16 ] CVE-2015-5544 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544 [ 17 ] CVE-2015-5545 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545 [ 18 ] CVE-2015-5546 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546 [ 19 ] CVE-2015-5547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547 [ 20 ] CVE-2015-5548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548 [ 21 ] CVE-2015-5549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549 [ 22 ] CVE-2015-5550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550 [ 23 ] CVE-2015-5551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551 [ 24 ] CVE-2015-5552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552 [ 25 ] CVE-2015-5553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553 [ 26 ] CVE-2015-5554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554 [ 27 ] CVE-2015-5555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555 [ 28 ] CVE-2015-5556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556 [ 29 ] CVE-2015-5557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557 [ 30 ] CVE-2015-5558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558 [ 31 ] CVE-2015-5559 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559 [ 32 ] CVE-2015-5560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560 [ 33 ] CVE-2015-5561 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561 [ 34 ] CVE-2015-5562 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562 [ 35 ] CVE-2015-5563 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563 [ 36 ] CVE-2015-5564 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564 [ 37 ] CVE-2015-5965 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201508-01 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05385680 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05385680 Version: 1 HPSBMU03692 rev.1 - HPE Matrix Operating Environment, Multiple Remote Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-02-03 Last Updated: 2017-02-03 Potential Security Impact: Remote: Bypass Security Restrictions, Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), Denial of Service (DoS), Disclosure of Information, Execution of Arbitrary Code Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY Multiple potential security vulnerabilities have been identified in HPE Matrix Operating Enviroment (MOE) on Windows. The vulnerabilities could be exploited remotely resulting in the Bypass of Security Restrictions, cross-site request forgery (CSRF), cross-site scripting (XSS), Denial of Service (DoS), Disclosure of Information, and Execution of Arbitrary Code. References: - CVE-2016-8531 - Information Disclosure - VSE - CVE-2016-8532 - XSS - VCEM - CVE-2016-8533 - Priviledge Escalation - VCEM - CVE-2016-8534 - Privilege Elevation - VSE - CVE-2016-8535 - Http Parameter Pollution - VCEM - CVE-2017-5780 - Clickjacking - MRM - CVE-2017-5781 - CSRF - VSE - CVE-2017-5782 - HSTS Header Missing - IO - CVE-2017-5783 - Clickjacking - SPM - CVE-2017-5784 - HSTS Header Missing - SPM - CVE-2017-5785 - Information Disclosure - SPM - CVE-2015-5127 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5129 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5130 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5131 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5132 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5133 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5134 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5539 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5540 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5541 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5544 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5545 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5546 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5547 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5548 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5549 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5550 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5551 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5552 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5553 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5555 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5556 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5557 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5558 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5559 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5560 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5561 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5562 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5563 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5564 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5565 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5566 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5575 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5576 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5580 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5574 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5588 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5570 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5572 - Adobe Flash - unauthorized disclosure of information - CVE-2015-6678 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5571 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5582 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5584 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5587 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5579 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5568 - Adobe Flash - unauthorized disclosure of information - CVE-2015-6679 - Adobe Flash - unauthorized disclosure of information - CVE-2015-6682 - Adobe Flash - unauthorized disclosure of information - CVE-2015-6677 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5573 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5578 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5577 - Adobe Flash - unauthorized disclosure of information - CVE-2015-6676 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5581 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8415 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8416 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8417 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8418 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8419 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8420 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8421 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8422 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8423 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8424 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8425 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8426 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8427 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8428 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8429 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8430 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8431 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8432 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8433 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8434 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8435 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8436 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8437 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8438 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8439 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8440 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8441 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8442 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8443 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8444 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8445 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8446 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8447 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8448 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8449 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8450 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8451 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8452 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8453 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8454 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8455 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8456 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8457 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8044 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8459 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8460 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8634 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8635 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8636 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8638 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8639 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8640 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8641 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8642 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8643 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8644 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8645 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8646 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8647 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8648 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8649 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8650 - Adobe Flash - unauthorized disclosure of information - CVE-2015-8651 - Adobe Flash - unauthorized disclosure of information - CVE-2016-2183 - Sweet32, DES, 3DES - CVE-2016-0777 - OpenSSH, unauthorized disclosure of information - CVE-2016-0778 - OpenSSH, unauthorized disclosure of information - CVE-2016-1907 - OpenSSH, unauthorized disclosure of information - CVE-2009-5028 - Namazu, unauthorized disclosure of information - CVE-2011-4345 - Namazu, unauthorized disclosure of information - CVE-2015-5254 - Apache ActiveMQ unauthorized disclosure of information - CVE-2016-4366 - HPE SIM, unauthorized disclosure of information - CVE-2015-5554 - Adobe Flash - unauthorized disclosure of information - CVE-2015-5567 - Adobe Flash - unauthorized disclosure of information - CVE-2016-8517 - HPE SIM, Cross-site Scripting (XSS) - CVE-2016-8516 - HPE SIM, Denial of Service - CVE-2016-8518 - HPE SIM, Denial of Service SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HP Matrix Operating Environment Software 7.6 - HP Systems Insight Manager (HP SIM), Software 7.6 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2009-5028 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2011-4345 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N) CVE-2015-5127 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5129 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5130 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5131 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5132 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5133 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5134 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5254 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2015-5539 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5540 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5541 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5544 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5545 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5546 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5547 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5548 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5549 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5550 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5551 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5552 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5553 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5554 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5555 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5556 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5557 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5558 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5559 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5560 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5561 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5562 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5563 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5564 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5565 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5566 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5567 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5568 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5570 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5571 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N) CVE-2015-5572 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE-2015-5573 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5574 7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5575 7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5576 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE-2015-5577 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5578 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5579 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5580 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5581 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5582 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5584 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5587 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-5588 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-6676 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-6677 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-6678 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-6679 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE-2015-6682 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8044 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8415 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8416 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8417 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8418 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8419 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8420 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8421 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8422 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8423 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8424 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8425 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8426 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8427 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8428 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8429 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8430 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8431 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8432 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8433 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8434 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8435 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8436 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8437 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8438 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8439 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8440 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8441 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8442 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8443 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8444 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8445 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8446 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8447 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8448 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8449 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8450 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8451 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8452 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8453 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N) CVE-2015-8454 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8455 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8456 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8457 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8459 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) CVE-2015-8460 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8634 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8635 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8636 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8638 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8639 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8640 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8641 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8642 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8643 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8644 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8645 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8646 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8647 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8648 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8649 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8650 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2015-8651 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE-2016-0777 3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N 4.0 (AV:N/AC:L/Au:S/C:P/I:N/A:N) CVE-2016-0778 5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L 4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P) CVE-2016-1907 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-2016-2183 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE-2016-4366 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) CVE-2016-8516 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L 4.0 (AV:N/AC:L/Au:S/C:N/I:N/A:P) CVE-2016-8517 6.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N 7.9 (AV:N/AC:M/Au:S/C:C/I:C/A:N) CVE-2016-8518 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 7.8 (AV:N/AC:L/Au:N/C:N/I:C/A:N) CVE-2016-8531 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N) CVE-2016-8532 6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N 7.0 (AV:N/AC:M/Au:S/C:P/I:C/A:N) CVE-2016-8533 5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N 6.8 (AV:N/AC:L/Au:S/C:C/I:N/A:N) CVE-2016-8534 3.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N 3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N) CVE-2016-8535 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N 4.0 (AV:N/AC:L/Au:S/C:N/I:P/A:N) CVE-2017-5780 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N) CVE-2017-5781 3.9 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N 5.0 (AV:L/AC:M/Au:S/C:P/I:C/A:N) CVE-2017-5782 5.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N) CVE-2017-5783 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N) CVE-2017-5784 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N) CVE-2017-5785 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has provided the following software updates to resolve the vulnerabilities in the HPE Matrix Operating Environment (MOE). The update kit applicable to the HPE Matrix Operating Environment (MOE) 7.6 is available at the following location: * <https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb r=HPID> HPE has addressed these vulnerabilities for the impacted software components bundled with HPE Matrix Operating Environment in the following HPE Security Bulletins: **HPE Systems Insight Manager (SIM)** HPE Security Bulletin: HPSBMU03668 * <https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05356388> HISTORY Version:1 (rev.1) - 3 February 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners

Trust: 2.43

sources: NVD: CVE-2015-5129 // JVNDB: JVNDB-2015-004075 // BID: 76282 // VULHUB: VHN-83090 // VULMON: CVE-2015-5129 // PACKETSTORM: 133037 // PACKETSTORM: 141092 // PACKETSTORM: 133099 // PACKETSTORM: 141028

AFFECTED PRODUCTS

vendor:opensusemodel:evergreenscope:eqversion:11.4

Trust: 1.0

vendor:adobemodel:air sdk \& compilerscope:lteversion:18.0.0.180

Trust: 1.0

vendor:adobemodel:air sdkscope:lteversion:18.0.0.180

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:11.2.202.491

Trust: 1.0

vendor:adobemodel:airscope:lteversion:18.0.0.180

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:18.0.0.209

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:18.0.0.209

Trust: 0.9

vendor:googlemodel:chromescope: - version: -

Trust: 0.8

vendor:adobemodel:airscope:ltversion:desktop runtime 18.0.0.199 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:air sdkscope:ltversion:18.0.0.199 (windows/macintosh/android/ios)

Trust: 0.8

vendor:adobemodel:air sdk & compilerscope:ltversion:18.0.0.199 (windows/macintosh/android/ios)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:11.2.202.508 (linux)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:18.0.0.232 (internet explorer 10/11)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:18.0.0.232 (microsoft edge)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:18.0.0.232 (windows/macintosh edition chrome)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:18.0.0.233 (linux/chrome os edition chrome)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:desktop runtime 18.0.0.232 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:flash playerscope:ltversion:continuous support release 18.0.0.232 (windows/macintosh)

Trust: 0.8

vendor:microsoftmodel:edgescope:eqversion:(windows 10)

Trust: 0.8

vendor:microsoftmodel:internet explorerscope:eqversion:10 (windows 8/windows server 2012/windows rt)

Trust: 0.8

vendor:microsoftmodel:internet explorerscope:eqversion:11 (windows 8.1/windows server 2012 r2/windows rt 8.1/windows 10)

Trust: 0.8

vendor:adobemodel:flash playerscope:eqversion:9.0.246.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.7.0.2100

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.5.50080

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.6.0.6090

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.25

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.60.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202346

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.95.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.31.230

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1.1961

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:16.0235

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.7.0.16600

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.155.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0214

Trust: 0.3

vendor:adobemodel:airscope:eqversion:13.083

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.0.19530

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.153.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.0.0.408

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.2460

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.285

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.9.900.170

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:8

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.11150

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.26

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.260

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.48

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.2.0.207

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.4.402.265

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202341

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.5.0.880

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.8.800.97

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.0.19140

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.300271

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:18.0.0.161

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:18.0.0.143

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.0.0.4080

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.63

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:16.0.0.257

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.8

Trust: 0.3

vendor:adobemodel:airscope:eqversion:15.0.0.293

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.71860

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.28.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.300270

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.260.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.23

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:12.0.0.41

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.277.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.6.602.168

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.300214

Trust: 0.3

vendor:susemodel:opensuse evergreenscope:eqversion:11.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.429

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.300262

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.283.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.21

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.01

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.7

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.8.0.910

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.44

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.0.1948

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.50

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.442

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.279

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.124.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.23

Trust: 0.3

vendor:adobemodel:airscope:eqversion:14.0179

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:15.0.0.249

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202238

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.8.0.1430

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.85.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.438

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.61

Trust: 0.3

vendor:adobemodel:airscope:eqversion:16.0.0.272

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.6.602.180

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.71660

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.0.1.152

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.0.19120

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.9.0.1030

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.460

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.31.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:16.0.0.296

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.9.900.117

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:4.01390

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.203

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.48.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.281

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.241

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.262

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.24

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.59

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.73

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.0.19480

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.71530

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.11

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.70.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.106.16

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:15.0.0.239

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:17.0.0.144

Trust: 0.3

vendor:adobemodel:airscope:eqversion:15.0.0.252

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.18

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:15.0.0.242

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.48

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.21

Trust: 0.3

vendor:adobemodel:airscope:eqversion:16.0.0.245

Trust: 0.3

vendor:adobemodel:airscope:eqversion:14.0178

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.280

Trust: 0.3

vendor:redhatmodel:enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202359

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202425

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.6.602105

Trust: 0.3

vendor:adobemodel:airscope:eqversion:18.0.0.180

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.291

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:10

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.270

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.95.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.33

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:11

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.300231

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.22

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.51.66

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.43

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.9.900.152

Trust: 0.3

vendor:adobemodel:airscope:eqversion:14.0.0.137

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.54

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.27

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:13.0111

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0252

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.262.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.238

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.19

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.9

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.20295

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700232

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.20

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.468

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:18.0.0.232

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.1.0.4880

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.92.8

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.75

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.24

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.5.0.890

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202160

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:15.0.0.189

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.66.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.5.502118

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0182

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:15.0.0.152

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.0.198

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202400

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.336

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.356

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.11569

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.3218

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.63

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.260

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.228

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.310

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3.9120

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:16.0.0.272

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.5.502.149

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.277

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.206

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.61.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.1.0.488

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.8.800.168

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.272

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.22.87

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:18.0.0.203

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0259

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.73.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.67

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.69.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.151.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.243

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:14.0.0.110

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.5.502124

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:16.0.0.291

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.202

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.29

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.159.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.9.0.1380

Trust: 0.3

vendor:adobemodel:airscope:eqversion:18.0.0.144

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700169

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.42.34

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.81

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:14.0178

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.8.800.94

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.26

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.4

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:18.0.0.180

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.1.8210

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.28

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.67.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:12.0.0.43

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.335

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.102.65

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.5.0.600

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:14.0.0.137

Trust: 0.3

vendor:adobemodel:airscope:neversion:18.0.0.199

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:8.0.35.0

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:13.0111

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.19140

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.115.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.231

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.300250

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.55

Trust: 0.3

vendor:redhatmodel:enterprise linux server supplementaryscope:eqversion:6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.14.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.5.502.110

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.156.12

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.0.1129

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.13

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.53.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202221

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:14.0179

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.22

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.2.12610

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:6.0.79

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.14

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:13.083

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:18.0.0.233

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.223

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:16.0.0.305

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.300.273

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.8.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.264

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.2.54

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.262

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.451

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.68.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.457

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.16

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.261

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202236

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:18.0.0.204

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.252

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.242

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.5

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.4.0.2540

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.9.0.1060

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.154.18

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:18.0.0.194

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.32.18

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.5.0.1060

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.12.36

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.289

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202297

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.289.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.3.0.3670

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202280

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.251

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.185.25

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202418

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.300268

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.3.0.3690

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.152.0

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:14.0.0.110

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700275

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.4.0.2710

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.275

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.4.402.287

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.52.14

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.269

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.6.602.171

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.23

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.82.76

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1.19610

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:18.0.0.144

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:17.0.0.188

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.0.160

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.0.1953

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.0.1.153

Trust: 0.3

vendor:adobemodel:airscope:eqversion:4.0.0.1390

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.8.800.170

Trust: 0.3

vendor:adobemodel:airscope:eqversion:17.0.0.172

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.6.602.167

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202197

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.3.0.3650

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.394

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.0.4990

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.11554

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.1.0.5790

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.105.6

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.6.0.599

Trust: 0.3

vendor:adobemodel:airscope:eqversion:15.0356

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.47.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.45.0

Trust: 0.3

vendor:adobemodel:airscope:eqversion:17.0.0.144

Trust: 0.3

vendor:adobemodel:air sdkscope:neversion:18.0.0.199

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.4.402.278

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.244

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:14.0176

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.300257

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.58

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.92.10

Trust: 0.3

vendor:adobemodel:airscope:eqversion:4.01628

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.5.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.6.19120

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:11.2.202.508

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.6.0.597

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:17.0.0.169

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.0.8.4990

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.6

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.102.64

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.2.0.2080

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.12.35

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.186.3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.5.502.135

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.4.400231

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:16.0.0.287

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.34

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.261

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:12

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:12.070

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:12.0.0.44

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.250

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:16.0.0.234

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.224

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.2.0.2070

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:14.0177

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.269

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:17.0.0.134

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.11

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.378

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.111.10

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.7.0.2090

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.5.1.17730

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:12.0.0.77

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.8.0.870

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.296

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.63

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.157.51

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:3

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.273

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.33610

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.228

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.106.17

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.52.15

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.327

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.112.61

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.2.152.32

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.25

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.406

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.52.14.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.491

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.7

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.9.0.1210

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.102.62

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.9.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.5.502131

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.332

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.235

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:14.0.0.125

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.53.64

Trust: 0.3

vendor:adobemodel:airscope:eqversion:18.0.0.143

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.5.502.136

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.0.7220

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:6.0.21.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:18.0.0.160

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.233

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.181.34

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:4.0.0.1390

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.5.0.16600

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:17.0.0.172

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.51

Trust: 0.3

vendor:adobemodel:airscope:eqversion:4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.59

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.466

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.292

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.258

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.225

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.7.0.15300

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:15.0356

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.258

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.229

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.452

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.115.8

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.159.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:15.0.0.223

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.10

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:15.0.0.246

Trust: 0.3

vendor:adobemodel:airscope:eqversion:15.0.0.249

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.15.3

Trust: 0.3

vendor:adobemodel:airscope:eqversion:3.1.0.485

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.411

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.16

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.440

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.5.502.146

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:13.0.0.201

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.15

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.481

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.0.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.378.5

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.7.700.257

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202350

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.24.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.19.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:8.0.34.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.3.300265

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:18.0.0.143

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.223

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:3.9.0.1380

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:14.0.0.145

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.1.11164

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.3.13070

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.3.183.5

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:12.0.0.38

Trust: 0.3

vendor:adobemodel:air sdkscope:eqversion:14.0.0.179

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.262

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:11.2.202.424

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.7.1

Trust: 0.3

sources: BID: 76282 // JVNDB: JVNDB-2015-004075 // CNNVD: CNNVD-201508-181 // NVD: CVE-2015-5129

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5129
value: HIGH

Trust: 1.0

NVD: CVE-2015-5129
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201508-181
value: CRITICAL

Trust: 0.6

VULHUB: VHN-83090
value: HIGH

Trust: 0.1

VULMON: CVE-2015-5129
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-5129
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-83090
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-83090 // VULMON: CVE-2015-5129 // JVNDB: JVNDB-2015-004075 // CNNVD: CNNVD-201508-181 // NVD: CVE-2015-5129

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-83090 // JVNDB: JVNDB-2015-004075 // NVD: CVE-2015-5129

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 141092 // PACKETSTORM: 133099 // CNNVD: CNNVD-201508-181

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201508-181

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004075

PATCH

title:APSB15-19url:https://helpx.adobe.com/security/products/flash-player/apsb15-19.html

Trust: 0.8

title:APSB15-19url:https://helpx.adobe.com/jp/security/products/flash-player/apsb15-19.html

Trust: 0.8

title:Google Chrome を更新するurl:https://support.google.com/chrome/answer/95414?hl=ja

Trust: 0.8

title:Google Chromeurl:https://www.google.com/intl/ja/chrome/browser/features.html

Trust: 0.8

title:Chrome Releasesurl:http://googlechromereleases.blogspot.jp/

Trust: 0.8

title:Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge (2755801)url:https://technet.microsoft.com/en-us/library/security/2755801

Trust: 0.8

title:Internet Explorer および Microsoft Edge 上の Adobe Flash Player の脆弱性に対応する更新プログラム (2755801)url:https://technet.microsoft.com/ja-jp/library/security/2755801

Trust: 0.8

title:アドビ システムズ社 Adobe Flash Player の脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/adobe/20150813f.html

Trust: 0.8

title:Red Hat: CVE-2015-5129url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-5129

Trust: 0.1

title:CVE-Studyurl:https://github.com/thdusdl1219/CVE-Study

Trust: 0.1

sources: VULMON: CVE-2015-5129 // JVNDB: JVNDB-2015-004075

EXTERNAL IDS

db:NVDid:CVE-2015-5129

Trust: 3.3

db:BIDid:76282

Trust: 2.1

db:SECTRACKid:1033235

Trust: 1.2

db:JVNDBid:JVNDB-2015-004075

Trust: 0.8

db:CNNVDid:CNNVD-201508-181

Trust: 0.7

db:VULHUBid:VHN-83090

Trust: 0.1

db:VULMONid:CVE-2015-5129

Trust: 0.1

db:PACKETSTORMid:133037

Trust: 0.1

db:PACKETSTORMid:141092

Trust: 0.1

db:PACKETSTORMid:133099

Trust: 0.1

db:PACKETSTORMid:141028

Trust: 0.1

sources: VULHUB: VHN-83090 // VULMON: CVE-2015-5129 // BID: 76282 // JVNDB: JVNDB-2015-004075 // PACKETSTORM: 133037 // PACKETSTORM: 141092 // PACKETSTORM: 133099 // PACKETSTORM: 141028 // CNNVD: CNNVD-201508-181 // NVD: CVE-2015-5129

REFERENCES

url:https://helpx.adobe.com/security/products/flash-player/apsb15-19.html

Trust: 2.2

url:http://www.securityfocus.com/bid/76282

Trust: 1.9

url:https://security.gentoo.org/glsa/201508-01

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2015-1603.html

Trust: 1.3

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05356388

Trust: 1.2

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05385680

Trust: 1.2

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390722

Trust: 1.2

url:http://www.securitytracker.com/id/1033235

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5129

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20150812-adobeflashplayer.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2015/at150029.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5129

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/topics/?seq=16704

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-5540

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5134

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5550

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5553

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5132

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5556

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5554

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5545

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5131

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5129

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5539

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5555

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5133

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5546

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5551

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5544

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5127

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5552

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5547

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5548

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5549

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5130

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-5541

Trust: 0.4

url:http://www.adobe.com/products/air/

Trust: 0.3

url:http://www.adobe.com/products/flash/

Trust: 0.3

url:http://www.adobe.com

Trust: 0.3

url:https://technet.microsoft.com/library/security/2755801

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2015-5129

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-5557

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-5558

Trust: 0.2

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-4345

Trust: 0.2

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.2

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05356388>

Trust: 0.2

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.2

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-5028

Trust: 0.2

url:https://h20392.www2.hpe.com/portal/swdepot/displayproductinfo.do?productnumb

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-5125

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5560

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5559

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5551

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5545

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5549

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5544

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5133

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5539

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5540

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5556

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5554

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5127

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5130

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5546

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5132

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5550

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5134

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5552

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5563

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5547

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5128

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5562

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5131

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5558

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5128

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5564

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5553

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5557

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5560

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5548

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5559

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5561

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05356363>

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05320149>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0050

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4877

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05376917>

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05390722

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5551

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5134

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5557

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5560

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5561

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5130

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5131

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5123

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5123

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5563

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5550

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5129

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3107

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5564

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5552

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5554

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5133

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5544

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5547

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3107

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5122

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5125

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5122

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5553

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5562

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5132

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5541

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5556

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5539

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5540

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5558

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5545

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5546

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5559

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5555

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5965

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5549

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5254

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05385680

Trust: 0.1

sources: VULHUB: VHN-83090 // VULMON: CVE-2015-5129 // BID: 76282 // JVNDB: JVNDB-2015-004075 // PACKETSTORM: 133037 // PACKETSTORM: 141092 // PACKETSTORM: 133099 // PACKETSTORM: 141028 // CNNVD: CNNVD-201508-181 // NVD: CVE-2015-5129

CREDITS

Kai Lu of Fortinet's FortiGuard Labs, instruder of the Alibaba Security Research Team.

Trust: 0.9

sources: BID: 76282 // CNNVD: CNNVD-201508-181

SOURCES

db:VULHUBid:VHN-83090
db:VULMONid:CVE-2015-5129
db:BIDid:76282
db:JVNDBid:JVNDB-2015-004075
db:PACKETSTORMid:133037
db:PACKETSTORMid:141092
db:PACKETSTORMid:133099
db:PACKETSTORMid:141028
db:CNNVDid:CNNVD-201508-181
db:NVDid:CVE-2015-5129

LAST UPDATE DATE

2024-11-23T20:07:44.542000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-83090date:2018-01-05T00:00:00
db:VULMONid:CVE-2015-5129date:2018-01-05T00:00:00
db:BIDid:76282date:2015-11-03T20:09:00
db:JVNDBid:JVNDB-2015-004075date:2015-08-17T00:00:00
db:CNNVDid:CNNVD-201508-181date:2015-08-13T00:00:00
db:NVDid:CVE-2015-5129date:2024-11-21T02:32:25.217

SOURCES RELEASE DATE

db:VULHUBid:VHN-83090date:2015-08-14T00:00:00
db:VULMONid:CVE-2015-5129date:2015-08-14T00:00:00
db:BIDid:76282date:2015-08-11T00:00:00
db:JVNDBid:JVNDB-2015-004075date:2015-08-17T00:00:00
db:PACKETSTORMid:133037date:2015-08-12T19:41:51
db:PACKETSTORMid:141092date:2017-02-15T00:39:05
db:PACKETSTORMid:133099date:2015-08-17T15:41:19
db:PACKETSTORMid:141028date:2017-02-13T16:38:41
db:CNNVDid:CNNVD-201508-181date:2015-08-13T00:00:00
db:NVDid:CVE-2015-5129date:2015-08-14T01:59:20.437