mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
228 lines
8.3 KiB
JSON
228 lines
8.3 KiB
JSON
{
|
|
"id": "CVE-2014-0500",
|
|
"sourceIdentifier": "psirt@adobe.com",
|
|
"published": "2014-02-12T04:50:41.313",
|
|
"lastModified": "2018-01-03T02:29:03.130",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Adobe Shockwave Player before 12.0.9.149 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0501."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Adobe Shockwave Player anterior a 12.0.9.149 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0501."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "12.0.7.148",
|
|
"matchCriteriaId": "0C4B100C-6C43-4BEF-AD9C-680C7764A41E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0EA1988-B297-43B3-B53C-605180CD5F8A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.9.620:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F07C1933-29D4-47B6-9B50-44F1EF6AA240"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.10.620:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64B38D3B-9C70-4502-996B-F394859399AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.0.626:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7D9EB67-823A-488B-86DB-BC232F131B2F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.1.629:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0E6977D0-66D6-4A03-B39C-7D70D48E59CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.3.633:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7976B06-6789-4B86-AE6C-EF7EF5759A8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.4.634:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "802E6A24-4E76-4AD9-8D58-FACB43B74095"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.5.635:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04E262FF-C95F-4069-B68A-040350BB186B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.6.636:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35A0653B-1854-466D-A0A4-87AD457F6367"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.7.637:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A2DC4C0-E142-4CC6-BF11-0014D7309245"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:11.6.8.638:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "94F47E4E-92BA-446C-802F-E801EA425F18"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.0.112:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D46FEE8E-CDA1-4603-AFE9-17EC8C9E6C3B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.2.122:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FF95CB3-1FA9-4F50-9FA3-5324D3731378"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.3.133:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E755A4C8-5ACD-49A7-8E29-5A88C85A35E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.4.144:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06DD1C43-66AF-4D66-B73D-C06415BAD769"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:shockwave_player:12.0.6.147:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC110854-7ACE-44E5-B73A-8A1EBD2AD84A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://helpx.adobe.com/security/products/shockwave/apsb14-06.html",
|
|
"source": "psirt@adobe.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/103157",
|
|
"source": "psirt@adobe.com"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/56740",
|
|
"source": "psirt@adobe.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/65490",
|
|
"source": "psirt@adobe.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1029740",
|
|
"source": "psirt@adobe.com"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91007",
|
|
"source": "psirt@adobe.com"
|
|
}
|
|
]
|
|
} |