Show plain JSON{"id": "CVE-2014-0534", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-06-11T10:57:17.423", "references": [{"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-16.html", "tags": ["Patch", "Vendor Advisory"], "source": "psirt@adobe.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html", "source": "psirt@adobe.com"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html", "source": "psirt@adobe.com"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html", "source": "psirt@adobe.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0745.html", "source": "psirt@adobe.com"}, {"url": "http://secunia.com/advisories/58390", "source": "psirt@adobe.com"}, {"url": "http://secunia.com/advisories/58465", "source": "psirt@adobe.com"}, {"url": "http://secunia.com/advisories/58585", "source": "psirt@adobe.com"}, {"url": "http://secunia.com/advisories/59053", "source": "psirt@adobe.com"}, {"url": "http://secunia.com/advisories/59304", "source": "psirt@adobe.com"}, {"url": "http://security.gentoo.org/glsa/glsa-201406-17.xml", "source": "psirt@adobe.com"}, {"url": "http://www.securityfocus.com/bid/67963", "source": "psirt@adobe.com"}, {"url": "http://www.securitytracker.com/id/1030368", "source": "psirt@adobe.com"}, {"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-16.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00021.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00029.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00030.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0745.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/58390", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/58465", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/58585", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/59053", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/59304", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-201406-17.xml", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/67963", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1030368", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "Adobe Flash Player before 13.0.0.223 and 14.x before 14.0.0.125 on Windows and OS X and before 11.2.202.378 on Linux, Adobe AIR before 14.0.0.110, Adobe AIR SDK before 14.0.0.110, and Adobe AIR SDK & Compiler before 14.0.0.110 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0535."}, {"lang": "es", "value": "Adobe Flash Player anterior a 13.0.0.223 y 14.x anterior a 14.0.0.125 en Windows y OS X y anterior a 11.2.202.378 en Linux, Adobe AIR anterior a 14.0.0.110, Adobe AIR SDK anterior a 14.0.0.110 y Adobe AIR SDK & Compiler anterior a 14.0.0.110 permiten a atacantes evadir restricciones de acceso a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2014-0535."}], "lastModified": "2024-11-21T02:02:20.120", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B74D363-BAAF-4F5D-B6F5-6C0709BBA028", "versionEndIncluding": "13.0.0.214"}, {"criteria": "cpe:2.3:a:adobe:flash_player:13.0.0.182:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3DD6547-ABEE-4734-87AA-BD3E247226B7"}, {"criteria": "cpe:2.3:a:adobe:flash_player:13.0.0.201:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0732FFB7-4BFD-499D-A166-9128F3DABA0B"}, {"criteria": "cpe:2.3:a:adobe:flash_player:13.0.0.206:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C282F91D-C1FE-4CC7-A33D-8E43F85DF168"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"}, {"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28E7C8BF-88F7-49CC-A7F5-4CC47B98BDF9", "versionEndIncluding": "13.0.0.111"}, {"criteria": "cpe:2.3:a:adobe:adobe_air:13.0.0.83:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C898203-9D6E-4430-8905-C28180F954E1"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8ADD247-FEE4-4FD6-855B-6BEFBB26C28F", "versionEndIncluding": "13.0.0.111"}, {"criteria": "cpe:2.3:a:adobe:adobe_air_sdk:13.0.0.83:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B005E5AC-DD7D-413E-92A2-4E8D7F3F2D7A"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18823BA9-2C8D-4E91-9CD8-FEAAA213C4DD", "versionEndIncluding": "11.2.202.359"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.251:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "472F569C-0FD5-4F61-A4D6-258A8A9C4008"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.258:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E91A468-191C-4A2D-B1B6-0DDE8BB1C1D8"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.261:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47F94E94-C190-4559-8FF6-FEEE6634B67B"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.262:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CC3FDE1-44FD-4BC3-BB43-C44C94D3F794"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.270:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE46E137-5298-44FA-B40C-6079C9AEE60F"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.273:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D14EAFB3-3718-466F-8EB2-61D00D569251"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.275:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD3390A0-8EB6-424E-96AC-B87E22D6FF6E"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.280:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCD935A5-D923-48CC-9699-977C5123D52C"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.285:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AABFF8D-2C2A-4B8B-9DE2-C74EECEDD86F"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.291:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD0EF3E4-C91F-4AD4-91E7-A10DC66DE4A3"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.297:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DDB9C24-953C-4268-8C4A-E7C0F021698E"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.310:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8474A98-24F4-43E5-9402-319F68A9880B"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.332:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CD7F4E8-742E-4264-84EE-22D9E3CB3C76"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.335:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97DBA814-D400-440C-BEEA-AB1913F783C1"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.336:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CDA6379-D70E-476C-82C5-C916C13CA081"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.341:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "515589AD-8CC1-46CE-9F9A-BAAD725E2C8F"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.346:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "308488AB-3D95-4231-8201-BF4EE5C9C151"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.350:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDB40406-277E-4BF5-ADCF-BE16B1CF390B"}, {"criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.356:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33165339-9DCC-46B2-B22F-CF31D26175D7"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "psirt@adobe.com"}