2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2014-0501" ,
"sourceIdentifier" : "psirt@adobe.com" ,
"published" : "2014-02-12T04:50:41.343" ,
2024-11-22 19:15:24 +00:00
"lastModified" : "2024-11-21T02:02:16.103" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0500."
} ,
{
"lang" : "es" ,
"value" : "Adobe Shockwave Player anterior a 12.0.9.149 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0500."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-22 19:15:24 +00:00
"baseScore" : 10.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-22 19:15:24 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "12.0.7.148" ,
"matchCriteriaId" : "0C4B100C-6C43-4BEF-AD9C-680C7764A41E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF19CBB1-F047-4472-A19D-48A147396383"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C51EB3CF-6770-4626-BDA7-9ED94A374911"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C61B9485-2A42-4C95-9A10-3F1102E4EBBD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7BFB28F3-ADA5-4BD1-9723-73FA291307BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9760A554-1D44-4249-97DE-8423A97BA9FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A0EA1988-B297-43B3-B53C-605180CD5F8A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F07C1933-29D4-47B6-9B50-44F1EF6AA240"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "64B38D3B-9C70-4502-996B-F394859399AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B7D9EB67-823A-488B-86DB-BC232F131B2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0E6977D0-66D6-4A03-B39C-7D70D48E59CB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D7976B06-6789-4B86-AE6C-EF7EF5759A8B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "802E6A24-4E76-4AD9-8D58-FACB43B74095"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "04E262FF-C95F-4069-B68A-040350BB186B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "35A0653B-1854-466D-A0A4-87AD457F6367"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A2DC4C0-E142-4CC6-BF11-0014D7309245"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "94F47E4E-92BA-446C-802F-E801EA425F18"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6FF95CB3-1FA9-4F50-9FA3-5324D3731378"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06DD1C43-66AF-4D66-B73D-C06415BAD769"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:shockwave_player:12.0.6.147:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FC110854-7ACE-44E5-B73A-8A1EBD2AD84A"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" ,
"source" : "psirt@adobe.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://osvdb.org/103158" ,
"source" : "psirt@adobe.com"
} ,
{
"url" : "http://secunia.com/advisories/56740" ,
"source" : "psirt@adobe.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/65493" ,
"source" : "psirt@adobe.com"
} ,
{
"url" : "http://www.securitytracker.com/id/1029740" ,
"source" : "psirt@adobe.com"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" ,
"source" : "psirt@adobe.com"
2024-11-22 19:15:24 +00:00
} ,
{
"url" : "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://osvdb.org/103158" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/56740" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/65493" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securitytracker.com/id/1029740" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/91008" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}